This is a weekly discussion topic for each area. Need short answers to each of six questions.
Total # of pages: 2
Topic: “Security Administration and Access Control”. Please respond to the following:
-
Research a specific lapse in professional ethics by an IT professional in the last five (5) years do following:
-
Summarize the ethical dilemma
-
Develop a plan in which you would mitigate the vulnerability.
-
-
Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical access controls are related to implementing a security policy.
Topic: “Security Monitoring”. Please respond to the following:
-
Considering your place of employment or your home computing environment, discuss in detail the way in which in-depth (or layered) defense is employed to enhance security in your chosen environment.
-
According to the textbook, Intrusion Detection Systems (IDS), which can be categorized as Host IDS (HIDS) and Network IDS (NIDS), is a means of providing real-time monitoring. Compare and contrast HIDS and NIDS, and provide at least one (1) example identifying when one (1) would be more appropriate to use over the other. Provide a rationale to support your chosen example.
Topic: “Business Impact Analysis (BIA) and Risk Management”. Please respond to the following:
-
According to the text, a BIA determines the extent of the impact that a particular incident would have on business operation over time. Determine the major ways in which people, systems, data, and property will impact a BIA. Provide specific examples to support your response.
-
Compare and contrast qualitative risk analysis and quantitative risk analysis, and provide at least two (2) examples identifying a situation when each would be useful.


0 comments