ETBU Organizing Policies in User Domain in Cyber Security Questions – Description
-What are the three ways to organize policies in the user domain in cyber security?-
What is the difference between business risk exposure and business liability in cyber security?
– How do you secure a website? one of the topics that we discuss are how to secure a site. Explain the process to secure a site. What do we need to understand about the Secure Facility Layered Defense Model? What are we protecting our important assets from? Where does the design start at? List the location-based threats. How can we protect the physical perimeter and how is the physical access controlled? What is the goal in working in secure areas?
In managing operations, which role would you be?
The key roles that are presented are:
Information Security Officer
Executive
Compliance Officer
Data Owner
Data Manager
Data Custodian
Data User
and Auditor
Out of these roles which one would you be and why? Look up the job and give a description of what it is. Provide information such as what degree level you need to get that job, the average salary of that position, and any other information that could be useful. Explain what you feel like would make you excel in that position, and somethings that you would have to work on. What are some places that are looking to hire that position right now and what are they looking for out of the person they want to fill that spot?
The post ETBU Organizing Policies in User Domain in Cyber Security Questions first appeared on .