1 Compare and contrast a white hat hacker with a black hat hacker. Present two examples of each. Take a position on the idea of hiring reformed black hat hackers. Determine the positive and negative ramifications this type of hiring could render for an organization.
2 Take a position on whether the term ethical hacking is an oxymoron. Support your opinion with evidence. Cite your sources. As Chief Security Officer for your organization explain the value ethical hackers would afford you.
3 “Social Networking” List three positive and three negative impacts of social networking. In your opinion, determine whether the positive impacts outweigh the negative impacts for a company determined to increase company awareness. Describe the role of the CIO in relationship to social networking and the organization. Describe the key activities that the CIO should be engaged in. Discuss ways that the IT organization can counter the negative impacts of social networking. – and – Explain how the IT organization can maintain an ethical posture while managing organizational behavior related to social networking.
4 “Data Protection and Security” As the CIO of a company engaged in business today, one of the main areas of focus is data protection. Discuss the key data protection points that must be taken into consideration prior to a strategy plan and policy being established for a company that has large data repositories and numerous external partners. – and – Assess the value that the International Standards Organization (ISO) provides CIOs, regardless of the industry in which the company is engaged. Explain whether adherence to the standards is essential to overall security management.
Latest completed orders:
|#||Title||Academic Level||Subject Area||# of Pages||Paper Urgency|