This assignment consists of two questions to test knowledge and assimilation of the course objectives.
1. One of the most significant and common threats is the insider threat. What actions do you think is appropriate for security an organization regarding the insider threat?
2. Imagine you are the new CEO of a toy Research & Design Company. Your company was in the process of creating an electronic gaming toy and the final protocol plans have been developed. You are not sure what security protocols are in place. What is your approach for securing the data from an outside threat?