“The Impact of Malware”
1.Analyze (2) resources that are available for security professionals to find information about threats and / or malware active today. Justify your belief these resources are helpful for security professionals.
2.Explain whether or not you believe that the myth of Mac devices being more secure than Windows devices is becoming history, and justify your answer. Further, indicate one (1) main reason why you believe this myth still exists in the minds of end users and businesses.
“Security Standards”
3.A number of organizations exist to define information security standards. Explain the importance of standards organizations with regard to both information systems and information systems security. Provide a rationale for your response.
4.Determine two (2) specific concerns that you believe exist for cloud deployments, and ascertain whether or not data breaches, such as the Snowden Incident have heightened concerns. Justify your answer.
“Certs and Compliance”
5.Describe one (1) IT position you would like to hold in the future. Next, explain whether or not you believe obtaining certifications would help you in the position in question. If so, determine the certifications that you believe would prove to be helpful. Provide a rationale for your response.
6.Explain the regulatory compliance law that you researched, and ascertain the effect that information security could have on such a law. Based on the requirements of the law that you researched, indicate whether or not you believe that the regulations are reasonable for organizations to follow. Justify your answer.