Prepare a System Security Plan (SSP) presentation slide deck to present your system security plan for CMI. The SSP may include artifacts discovered from the CMI risk assessment, the security […]
security
Security Frameworks
We are going to look at the various security frameworks in use today in cybersecurity. You will need to look at your organization’s security framework policies from ISSC479 Week […]
Transportation Security
Discuss security measures in Transportation and Logistics Management. What security measures are currently in place? Are they effective? Why or why not? What are the challenges that exist in continuous […]
Transportation Security
Discuss security measures in Transportation and Logistics Management. What security measures are currently in place? Are they effective? Why or why not? What are the challenges that exist in […]
BCC Information Security Budget.
use information from the previous weeks to complete the BCC Information Security Budget. The chief information security officer (CISO) is tasked with developing a budget to reduce costs […]
Leader within the Department of Homeland Security.
Imagine that you are a leader within the Department of Homeland Security. You are aware of a trend in cyberterrorism and recruitment by terrorist groups such as ISIS. The […]
Capabilities and limitations of domestic intelligence efforts in supporting the homeland security enterprise
What are the capabilities and limitations of domestic intelligence efforts in supporting the homeland security enterprise? Regarding such capabilities, do you feel that the U.S. is appropriately structured and […]
IT and Security Manager for a small five-physician medical practice that uses electronic medical records
You are the IT and Security Manager for a small five-physician medical practice that uses electronic medical records (EMR) but has never performed a HIPAA security risk assessment. […]
Security Assessment
read the story entitled The Importance of Knowing Your Own Security Posture. After reviewing the story, conduct research online into the various possibilities for conducting a risk assessment for […]
How intelligence-sharing mechanisms contribute to enhancing homeland security
How do intelligence-sharing mechanisms contribute to enhancing homeland security preparedness and response?