Discussion Questions

1. Users of information systems operate in an environment where they are often faced with making decisions related to downloading files or opening email attachments. Despite corporate information security policies as well as user training, malicious software is still introduced into an environment by employees making poor decisions. Research best practices organizations use to prevent poor decisions by employees from having a negative impact on information systems.

250-350 words long with proper punctuation, capitalization, and grammar. Include three (3) different sources (the textbook does not count).

2. Research recent data breaches and choose one to focus on for this discussion. Outline the specific events that led to the breach and how the company responded when the breach was identified. Identify any regulations that have been implemented as a result of the data breach. If the regulations are effective, describe the positive impact. If they are not effective, discuss what needs to be improved.

250-350 words long with proper punctuation, capitalization, and grammar. Include three (3) different sources (the textbook does not count).


3. Provide a critical assessment of national response and recovery protocols. Use the following websites, or find other sources from the Deets Library:

250-350 words long with proper punctuation, capitalization, and grammar. Include three (3) different sources (the textbook does not count).

"Order a similar paper and get 15% discount on your first order with us
Use the following coupon
"FIRST15"

Order Now