CIS 560 Week 3 Discussion Question
"Federal Laws that Deter Information Theft" Please respond to the following:
#1 Find an example, through research of Federal Law that was applied to an individual, organization, or country to expose or prosecute those involve in attempted or successful information theft. Briefly explain in your own words the situation and the result. Don’t copy and paste the ‘case’ from Internet sources. In your research, how many examples did you uncover? Why do you think there were ‘many’ or why there were ‘few’ cases?
#2 We can find examples of organizations that did not plan for business continuity, conduct risk mitigation exercises, or create disaster recovery plans by researching cases associated with Y2K and the 9/11 disaster. Since some scoff at the idea that Y2K would/might have created a disaster scenario for businesses and organizations, the more likely impact that can be studied is that associated with companies affected by the events that occurred on September 11, 2001. What did organizations of ‘today’ learn from the companies and organizations that did or did not have business continuity and/or disaster recovery plans? Summarize the information that you find on this topic. Don’t copy and paste online articles. Is there evidence that organizations and governments are ‘better’ prepared today for a disaster that negatively impacts its operation and jeopardizes it data and information?
CIS 560 Week 3 Discussion Question " Federal Laws that Deter Information Theft" Please respond to the following: #1 Find an example, through research of Fed
CIS 560 Week 3 Discussion Question " Federal Laws that Deter Information Theft" Please respond to the following: #1 Find an example, through research of Fed
No comments:
Post a Comment
Note: only a member of this blog may post a comment.