.
Discuss the importance of enforcing the separation of duties. Give examples to clarify and justify its importance. How does this relate to and reinforced job roles and responsibilities? How are separation of duties important in the realm of IT security? How do separation of duties differ from mandatory vacation and job rotation? Give some examples of why these tenants are important in cybersecurity?
2- Discussion Board
Discuss and give examples of the Federal Information and Management Act. How does this law impact the security across the federal government both indirectly and directly? Do you think it is enough? Give examples.
Example of My classmate answer: The Federal Information Security and Management Act is a signed legislation that was passed into a law by congress in the United States. This was set in motion to protect government information and any classified documents that are consider assets against general population unless authorize to reales by officials. There is a management of inventory in which information systems pass a process of maintaining data secure and is owned by the federal government. This law is passed throughout every state and extended lands such as Alaska Hawaii and Puerto Rico. The government ensures that there will be no break or breach of information by allowing the action to contract hackers in order to maintain the system impenetrable. This also includes security from what is known as social engineering. Social engineering is a old modern form of obtaining information through physical aspects. The data entered in these servers are consider protected and secure for that many cyber attacks have continuously raised throughout time due to modern technology being more accessible.
3 Discussion Board
Describe the difference between DNSSEC and DNSCURVE? How do they differ and why do you think people aren't moving toward DNSCURVE? Why are agencies promoting and requiring DNSSEC? what does this mean for the private sector? What do you think about this?
SHORT PAPER ON THE SAFE HARBOR PROGRAM (EU-US PRIVACY SHIELD PROGRAM)
Prepare to do a deepish dive into subject areas for preparation of the CISSP.
Short papers: Explain, contrast or compare the subject - 3-5 pages -
Compare and contrast the EU-US Privacy Shield Program /Safe Harbor to US privacy laws - Why is this important and how does this impact US companies doing business abroad?
single spacing, normal margins, use 12 pt font - reference what isn't yours please –