ITM Information Security Overview for Managers
Need a 6-7 page paper analyze the prevalence of these threats in the United States. Analysis of each of these threats in terms of organizations and government entities is a key topic in this country, not only to secure trade secrets and operations in organizations, but to secure the democratic government at the national and state levels. APA format, reference page, title page.
Module 2
Given the many security threats to information and infrastructure discussed in Module 2 you will analyze the prevalence of these threats in the United States. Analysis of each of these threats in terms of organizations and government entities is a key topic in this country, not only to secure trade secrets and operations in organizations, but to secure the democratic government at the national and state levels.
Important Video:
https://tlc.trident.edu/content/enforced/136285-ITM517-2020JAN13FT-1/ITM517module2.mp4?_&d2lSessionVal=whAD7aiKQ3hXjkmnFnyre2vBm&ou=136285
Assignment Expectations
Using the types of security threats discussed in Module 2, review the trade journals, newspapers, and other sources on the Internet to discuss the prevalence of these attacks on organizations and government entities in the United States.
This will be graded in terms of the number of attacks uncovered and the firms/government agencies targeted. You need to provide references for each attack and discuss the impact of that attack.
Background Readings:
To access Skillsoft books, go to Skillsoft’s Books24x7 in the Additional Library Resources. For additional help, follow these instructions for Finding Skillsoft Books.
Read Chapters 3 to 9
Andress, Jason and Winterfeld, Steve (2014). Cyber warefare: Techniques, tactics and tools for security practitioners. Syngress, Waltham, Ma. (ISBN: 9780124166721). Available in the Trident Online Library.
Read chapters 4 and 5
Chappel, M. Ballad, B., Ballad, T. and Banks, E. K. (2014). Access control, authentication, and public key infrastructure. Jones and Barlett Learning, 2nd Edition
Read Chapter 1
Risk management for enterprises and individuals (2017) Book under Creative Commons
Read Chapters 3 to 5
Simmons, Andrea C. (2012). Once more unto the breach: Managing information security in an uncertain world. Ely, Cambridgeshire, IT Governance Publishing. ISBN (9781849283885). Available in the Trident Online Library.
Soper, Daniel (2017). Information Privacy and Security. Security Lesson #3 Software Program Security
Soper, Daniel (2017). Information Privacy and Security. Security Lesson #4 Malicious Code – Malware
Soper, Daniel (2017). Information Privacy and Security. Security Lesson #5 – Illicit Data Interception and Access