Type: Process Essays
Sample donated: Bryan Neal
Last updated: May 19, 2019
Learning Module 5Alex AlvarezHodges UniversityDr. Edward Forde Learning Activity 02Did any of the predictions from the video causeyou more concern than the others? Explain. Yes, the prediction of the internet of things that can bemanipulated by a hacker and with malicious intent by the hacker this would makethe corporation inoperable and can cause for the corporation to lose a lot ofmoney and can cause a lot of damage to any business because of this.Learning Activity 03Chapter 17Describe the best practices that should be inplace for a quality AT&E program. First, a respectable AT&E program should have a needsanalysis in place.
This test consists of the level of literacy of the personnelon this certain subject and lets a needs-based prioritization to take effect.Based on the results of the test the company should build an AT&E program.The company should put their emphasis on maintaining, developing, andimplementing an information assurance AT&E program. You should reflect thetactic in the strategy, which is an actual paper that has the plannedessentials and how do they relay to the total information assurance plan. “Change Management is a DisciplinedProcess” – this statement appears in Chapter 17.
Discuss why it is critically important thatthis be a true statement in any information assurance program. This is because change management maintains and progress theway a corporation can better their own operations while lessening risksinvolved in creating changes. It makes sure that all the things that changewhether its temporary or permanent to the information technology structure thatare approved, implemented, and reviewed in a meticulous way.
Chapter 18What is the importance of change andconfiguration management to information assurance?The importance of change management is that this process isas way that corporations set forth this process so that when methods andprocedures can be implemented properly. This process would result in lessoverhead and can make it easier for the corporation in the long run.Configuration management controls such things as computer software and hardwareand the documents that come with it. Configuration and change management worktogether well because if it is not done this way this can result in a negativemanner in that resources would be wasted because of this.
Chapter 19Contrast the three access control models –discretionary, mandatory and role-based. The difference between these control models is thatdiscretionary control model the proprietor stipulates which topics can get intothe system. In the mandatory access control model, it is not the users but thesystem which says who can access the system. With the role base access controlaccess is given permission depending on the role that you have with theorganization.
Did any of the predictions from the video causeyou more concern than the others? Explain.Yes, the prediction about blastwareis going to be used by hackers to destroy data and to cover their tracks. Thisis because it can be an unpredictable to not only track this but can be harderto get rid of which can cause great damage and will give the hacker the upperhand.