SlideShare a Scribd company logo
These are discussion questions (4). Need short response to each
of questions.
Total page: 1
"Security Support Responsibilities" Please respond to the
following:
1) Imagine you are the CIO of an organization. Construct an
outline of four ongoing responsibilities that the digital forensics
personnel must complete each week. Provide a possible scenario
for how each responsibility may be performed to fulfill the
forensics’ needs of an organization.
2) Compare the responsibilities you listed above with those of
an IT security professional.
Give your opinion on how responsibilities of digital forensics
personnel and IT security professional are similar and in which
ways are they different.
"Functional Security Support Roles" Please respond to the
following:
3) Identify three steps required for implementing a physical and
environmental security program. Select one step that would be
the most challenging to perform and one step that you believe is
the most important for providing protection against information
assets of an organization. Explain why you chose each step.
4) Suggest three security support competencies of a privacy
professional that support the security strategy of an
organization. Justify your suggestions.
These are discussion questions (4).  Need short response to each o.docx

More Related Content

DOCX
Term Paper The Rookie Chief Information Security Officer.docx
DOCX
Week 4. Discussion The Huma.docx
DOCX
WEEK 1Resources Frameworks and Plenitude Please respond to t.docx
DOCX
This assignment consists of five (5) parts     Part 1 Organi.docx
DOCX
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
DOCX
The Rookie Chief Information Security OfficerThis assignment c.docx
DOCX
Title Developing the Corporate Strategy for Information Securit
DOCX
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
Term Paper The Rookie Chief Information Security Officer.docx
Week 4. Discussion The Huma.docx
WEEK 1Resources Frameworks and Plenitude Please respond to t.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
The Rookie Chief Information Security OfficerThis assignment c.docx
Title Developing the Corporate Strategy for Information Securit
The Rookie Chief Information Security OfficerDue Week 10 and w.docx

Similar to These are discussion questions (4).  Need short response to each o.docx (16)

DOCX
Cmgt 400 entire course
DOCX
The Rookie Chief Information Security OfficerWorth 200 poi
DOCX
Term Paper The Rookie Chief Information Security OfficerD
DOCX
Responses needed, a paragraph per bullet question (7-8 sentences).docx
DOCX
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
DOCX
View Attachment for all questions. All 21 Questions should be an.docx
DOCX
Cis 333 Enthusiastic Study / snaptutorial.com
DOCX
Cis 333 Success Begins / snaptutorial.com
DOCX
Assignment 1 Developing the Corporate Strategy for Information Secu.docx
PDF
Cmgt 400 cmgt400
DOCX
The Rookie Chief Information Security OfficerThis assignme
DOCX
Pg. 01Special Instructions (ProjectDeadline Tue.docx
DOCX
Business Strategy and Policy (MHRM 612-1)1. An organization’s .docx
DOCX
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
DOCX
The Rookie Chief Information Security OfficerThis assignment consi.docx
DOCX
Cmgt 400 week 1 it security report
Cmgt 400 entire course
The Rookie Chief Information Security OfficerWorth 200 poi
Term Paper The Rookie Chief Information Security OfficerD
Responses needed, a paragraph per bullet question (7-8 sentences).docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
View Attachment for all questions. All 21 Questions should be an.docx
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Success Begins / snaptutorial.com
Assignment 1 Developing the Corporate Strategy for Information Secu.docx
Cmgt 400 cmgt400
The Rookie Chief Information Security OfficerThis assignme
Pg. 01Special Instructions (ProjectDeadline Tue.docx
Business Strategy and Policy (MHRM 612-1)1. An organization’s .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
The Rookie Chief Information Security OfficerThis assignment consi.docx
Cmgt 400 week 1 it security report
Ad

More from alisoncarleen (20)

DOCX
These are 19 questions for my international politics class. I need t.docx
DOCX
There is two assignments in Society and Technology and one assignmen.docx
DOCX
There has been a lot of concern over the Digital Divide. For your di.docx
DOCX
There is a notably challenging requirement for all emergency manager.docx
DOCX
There are two things1. Let us use this thread to center a discus.docx
DOCX
There are two things in boldWhat is your philosophy of educatio.docx
DOCX
There are two persons,First one he developed health and opened a .docx
DOCX
there are two Advertising pictures uploaded in the attachment. I wan.docx
DOCX
There are three main questions.Each question MUST use progra.docx
DOCX
There are three (3) articles for reading and comparison matrixoutli.docx
DOCX
There are stories of sacrifice, bondage and exodus, and survival in .docx
DOCX
There are multifaceted ethical issues relating to international inve.docx
DOCX
There are problems in the file.10 hours left until deadline .docx
DOCX
There are many points of overlap between Frankenstein, The Isl.docx
DOCX
There are many different types of infrastructure attacks.  These inc.docx
DOCX
There are many great research projects already using willing partici.docx
DOCX
There are many different theories as to why people commit crimes, su.docx
DOCX
There are five essential principles of management. These include pla.docx
DOCX
There are four general principles of effective intervention that hav.docx
DOCX
There are a number of types of private insurers. Describe each type .docx
These are 19 questions for my international politics class. I need t.docx
There is two assignments in Society and Technology and one assignmen.docx
There has been a lot of concern over the Digital Divide. For your di.docx
There is a notably challenging requirement for all emergency manager.docx
There are two things1. Let us use this thread to center a discus.docx
There are two things in boldWhat is your philosophy of educatio.docx
There are two persons,First one he developed health and opened a .docx
there are two Advertising pictures uploaded in the attachment. I wan.docx
There are three main questions.Each question MUST use progra.docx
There are three (3) articles for reading and comparison matrixoutli.docx
There are stories of sacrifice, bondage and exodus, and survival in .docx
There are multifaceted ethical issues relating to international inve.docx
There are problems in the file.10 hours left until deadline .docx
There are many points of overlap between Frankenstein, The Isl.docx
There are many different types of infrastructure attacks.  These inc.docx
There are many great research projects already using willing partici.docx
There are many different theories as to why people commit crimes, su.docx
There are five essential principles of management. These include pla.docx
There are four general principles of effective intervention that hav.docx
There are a number of types of private insurers. Describe each type .docx
Ad

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Pre independence Education in Inndia.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Institutional Correction lecture only . . .
PDF
Basic Mud Logging Guide for educational purpose
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Cell Types and Its function , kingdom of life
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
RMMM.pdf make it easy to upload and study
Anesthesia in Laparoscopic Surgery in India
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Supply Chain Operations Speaking Notes -ICLT Program
Pre independence Education in Inndia.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPH.pptx obstetrics and gynecology in nursing
human mycosis Human fungal infections are called human mycosis..pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
O5-L3 Freight Transport Ops (International) V1.pdf
Institutional Correction lecture only . . .
Basic Mud Logging Guide for educational purpose
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Final Presentation General Medicine 03-08-2024.pptx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Cell Types and Its function , kingdom of life
Renaissance Architecture: A Journey from Faith to Humanism
VCE English Exam - Section C Student Revision Booklet
102 student loan defaulters named and shamed – Is someone you know on the list?
RMMM.pdf make it easy to upload and study

These are discussion questions (4).  Need short response to each o.docx

  • 1. These are discussion questions (4). Need short response to each of questions. Total page: 1 "Security Support Responsibilities" Please respond to the following: 1) Imagine you are the CIO of an organization. Construct an outline of four ongoing responsibilities that the digital forensics personnel must complete each week. Provide a possible scenario for how each responsibility may be performed to fulfill the forensics’ needs of an organization. 2) Compare the responsibilities you listed above with those of an IT security professional. Give your opinion on how responsibilities of digital forensics personnel and IT security professional are similar and in which ways are they different. "Functional Security Support Roles" Please respond to the following: 3) Identify three steps required for implementing a physical and environmental security program. Select one step that would be the most challenging to perform and one step that you believe is the most important for providing protection against information assets of an organization. Explain why you chose each step. 4) Suggest three security support competencies of a privacy professional that support the security strategy of an organization. Justify your suggestions.