Cengage assignment for information security class all can be found in Chegg so you only to Paraphrase the answer that for Think Critically Quiz
Essay Submittal only one page no chegg or any other source.
MindTap Information Security, 1 term (6 months) Instant Access for Whitman/Mattord's Principles of Information Security , 6th Edition
Michael E. Whitman; Herbert J. Mattord
ISBN-10: 1-337-28164-6
ISBN-13: 978-1-337-28164-5
Assignment: Module 12 Think Critically Quiz
After reading the case presented in the module, write a short response to the following discussion questions and ethical decision making scenario.
Discussion Questions
a.What area of the SP 800-100 management maintenance model addresses the actions of the content filter described here?
b.What recommendations would you give SLS for how it might select a security management maintenance model?
Ethical Decision Making
Referring back to the opening case of this chapter, suppose Charlie had just finished a search for a new job and knew that he would soon be leaving the company. When Iris came in to talk about the tedious and time-consuming review process, he put her off and asked her to schedule a meeting with him “in 2 or 3 weeks,” knowing full well that he would be gone by then.
a.Do you think this kind of action is unethical because Charlie knows he is leaving soon?
Assignment: Krebs on Security Essay Submittal
Open a new Microsoft® Word document, and enter your answer to one of the prompts below:
Select two articles from the RSS feed, one that details an information security concern and one that explains a new cybersecurity skill or knowledge. Summarize each article and include a concluding paragraph that explains how you as a cybersecurity professional would use this information.
Scan the articles that appeared over the last two weeks. Use those articles to create your own one-page summary of significant security concerns over the last two weeks and the major events that have occurred.
Select one article that is of particular interest to you. Perform additional Internet research on that topic and then write a summary of that article. Include why you were interested in the article, what you learned from it, and how you could use it in your career as a cybersecurity professional.
2. Save the file on your computer with your last name in the file name. (Example: chapter_01_essay_Jones.doc)
3. Click the Choose File button below to find and select your saved document, and then click Submit Assignment for Grading.