help with discussion questions 15
please read each questions carefully and provide answer under the question. Make to answer the question fully. APA provide references. This is not a paper.
part 1
Chaining multiple firewalls together to form what’s called a demilitarized zone or ‘DMZ’ is a common networking security configuration for large corporate networks.
Create a thread and tell us what services you would place in the DMZ of your corporate network, and why you would configure your external security this way.
part 2
You have just been hired as a consultant by an eCommerce Chocolate Company to help with business continuity efforts. Create a timeline / process similar to figure 7.1 in the textbook outlining the steps to respond to a data breach. Briefly discuss each section (Planning, Incident management, business continuity, business resumption).
part 3
- Auditing (of any type) can be quite stressful, however is a rewarding occupation. How can managers help to encourage staff growth and dedication to the field?
- Discuss the balance required between on the job training and formal training needed to be the most successful auditor possible.
- What is the difference between a CPA, CA, CISSP, and CBA? Which interests you most and why?
- Audits are assessed for completeness, accuracy, pertinence, appropriate determinations and recommendations, and recommendations. Define and discuss three of these criteria and why all are necessary.
- In your opinion what are the advantages of securing your CISA certification