Cyber Security Planning and mgmt – week two

Cyber Security Planning and mgmt – week two

  • Attached Files:
    • File (13.021 KB)
    • Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

      What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

  • Discussion BoardEach week please link to an instructor facilitated Discussion Board forum. A Discussion Board rubric clearly communicates expectations for participation, please see the as an example.
    In your own words, explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability. Why are these factors so important to businesses?