Must use 250 words for each question and should be like we’re generally talking with no Google content and Plagiarism. Write this content in Word Doc format APA Format
1. Your boss mentions that recently a number of employees have received calls from individuals who didn't identify themselves and asked a lot of questions about the company and its computer infrastructure. At first, he thought this was just a computer vendor who was trying to sell your company some new product, but no vendor has approached the company. He also says several strange e-mails requesting personal information have been sent to employees, and quite a few people have been seen searching your company's trash dumpsters for recyclable containers. Your boss asks what you think about all of these strange incidents. Respond and be sure to provide recommendations on what should be done about the various incidents.
2. Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful and describe how it could have been prevented.
3. Discuss the importance of user technology security education within organizations. What topics should be included in security education and training?
4. What concerns should be understood about data communications being sent over wireless networks? Discuss the pros and cons of one method of transmission, such as Wireless Application Protocol (Search the Internet for help in wireless networks).
5. Describe the best practice to employ to mitigate malware effects on a machine.
6. Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications?
7. Describe and discuss at least two backup strategies. Discuss the use of cloud backup strategies, as well?
8. Discuss one of the most important things you will take from these topics. You do not have to document your sources for this question. It is an opinion question. (Information Technology and Security).
A. Search the Internet for IT governance planning. Select a specific governance plan that exists at a company or a plan framework from an organization. Write a 2-page paper on three or four of the most important suggestions from the plan you select.
B. You may write on any topic related to technology security. You must produce a minimum of a 10 pages paper. You must use a minimum of 5 references.
C. Provide a short narrative on security techniques and mechanisms in protecting against spam activity. (250 words minimum).
50 freelancers are bidding on average $58 for this job
se 250 words for each question and should be like we’re generally talking with no Google content and Plagiarism. Write this content in Word Doc format APA Format