Preview

BTC200 HW2

Satisfactory Essays
Open Document
Open Document
422 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
BTC200 HW2
Homework Assignment #2 (B Plug-in 6)

1) How could an organization benefit from attending one of the courses offered at the Intense School?

By attending of the course offered at the school an organization would gain valuable knowledge on how to protect their system from hackers. If the organization were heavily dependent on the smooth operation of their IT system this would be essentially important. The amount of knowledge that would be gained from the courses, they can facilitate the creation of a better security system.

2) What are the two primary lines of security defense and how can organizational employees use the information taught by the Intense School when drafting an information security plan?

The two primary lines of security defense are through people first and technology second. The courses will enlighten the employees how easy it is for hackers to deploy social engineering to gain private information from them. Employees can use the information taught at the school to draft an information security plan that details how an organization will implement the information security policies. The school will most likely teach many of the tricks to social engineering and hacking, which the employees can use to create the detailed information security policies.

3) Determine the differences between the two primary courses offered at the Intense School, “Professional Hacking Boot Camp” and “Social Engineering in Two Days.” Which course is more important for organizational employees to attend?

The two main differences is that one covers the Technology of the security defense line and the other covers issues with the People. The course Social Engineering in Two Days is more important for organizational employees to attend because it would be easiest for hackers to gain access through employees giving away passwords, leaving password lying around, etc. So by attending this course they can protect themselves from being a victim of social engineering.

4) If

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Final Acc 340

    • 1422 Words
    • 4 Pages

    For each of the following course objectives, explain in 200-400 words what you learned in this course and how you could apply your learning of this course objective to your personal life or career. Refer to the syllabus to assist you in understanding what material was covered under each objective.…

    • 1422 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Imagine University of Phoenix’s IT department has hired you. Your first task is to make sure the department is following the most important information security practices.…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Develop a brief (300-350 word) response discussing your goals for this course. Consider the following questions in your response:…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Class I worked with a community college network a few years ago and it was almost fun to watch. No matter how much bandwidth they purchased, the students would use it all. They could not get educational traffic to work because there was too much competition from students gaming and streaming audio and video. Ultimately they purchased some expensive bandwidth management equipment to give priority to certain traffic. The problem was not really security, but rather, controlling usage.…

    • 1177 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Risky Situation

    • 1497 Words
    • 6 Pages

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1497 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Due to the ever changing landscape of the business world many employers often send their employees to attend trainings and seminars. Though this specialized training sessions are costly the return a company gets from it is worth the investment. A company that constantly sends its employees to school to acquire a fresh and new ideas has a greater advantage than a company that do not offer such benefit.…

    • 1318 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Living with Art

    • 284 Words
    • 2 Pages

    9. What strengths (academic and/or personal/professional) do you feel will assist you in the successful completion of this course?…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    As the training manager for super safe security (SSS) regarding Carl Smiths concerns in response to the cost of conducting a second or refresher training, I would reassure him that this training benefits our organization goals and mission. I would also like to reassure Mr. Smith that proper training within the area of security affects us since many companies today “are in business to make money, and every business function is under pressure to show how it contributes to business success or face spending cuts and outsourcing. To help contribute to this success, training activities should help the company achieve…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Computer Engineering Ethics

    • 4012 Words
    • 17 Pages

    At the end of this class the course participant should be able to:  Identify some contributors to social and professional issues and relate their achievements to the knowledge area  Contrast between ethical and legal issues  Contrast between a patent, a trademark, and a copyright  Identify some ways of credentialing a person to practice computer engineering  Describe issues that contrast risk issues with safety issues  Identify some issues in computer engineering that address privacy  Describe whistle blowing and the conflicts between ethics and practice that may result from doing so  Describe how computer engineering uses or benefits from social and professional issues. 2.2 Reasons for Studying Social and Professional Issues…

    • 4012 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Organizational Behavior

    • 435 Words
    • 2 Pages

    3. How does a course in organizational behavior differ from courses in fields such as accounting, finance, or marketing?…

    • 435 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Narrative Report for Ojt

    • 419 Words
    • 2 Pages

    The company created a good service to their clients and gave the besttraining for the students. The students must have a good company that wouldgive them a good training ground and would enhance their knowledge andcapabilities. The school must have the good coordination for some companiesthat offer an annual On the Job Training inside their company. The school shouldprovide more budgets given to the OJT coordinators to have the best monitoringof the training the students are taking. One of the best ways of training is theprovincial trainings that would give different experiences to the trainees. An out of town training would give more self esteem to the students. The mechanicalengineering students have their training every 4th year and second semester of the year. It is more efficient if they will take it 5th year of their last semester. Insome cases having…

    • 419 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Industrial Attachment

    • 582 Words
    • 3 Pages

    2.2 Second week: On the second week, I was initially introduced to the importance of `security to the IT firm and how to implement it efficiently to help sustained the existence of an organization by…

    • 582 Words
    • 3 Pages
    Satisfactory Essays