help with discussion questions 15

please read each questions carefully and provide answer under the question. Make to answer the question fully. APA provide references. This is not a paper.

part 1

Chaining multiple firewalls together to form what’s called a demilitarized zone or ‘DMZ’ is a common networking security configuration for large corporate networks.

Create a thread and tell us what services you would place in the DMZ of your corporate network, and why you would configure your external security this way.

part 2

You have just been hired as a consultant by an eCommerce Chocolate Company to help with business continuity efforts. Create a timeline / process similar to figure 7.1 in the textbook outlining the steps to respond to a data breach. Briefly discuss each section (Planning, Incident management, business continuity, business resumption).

part 3

  1. Auditing (of any type) can be quite stressful, however is a rewarding occupation. How can managers help to encourage staff growth and dedication to the field?
  2. Discuss the balance required between on the job training and formal training needed to be the most successful auditor possible.
  3. What is the difference between a CPA, CA, CISSP, and CBA? Which interests you most and why?
  4. Audits are assessed for completeness, accuracy, pertinence, appropriate determinations and recommendations, and recommendations. Define and discuss three of these criteria and why all are necessary.
  5. In your opinion what are the advantages of securing your CISA certification