1.Information Technology leaders, including information assurance and security p
ID: 3709327 • Letter: 1
Question
1.Information Technology leaders, including information assurance and security professionals, communicate through various channels including e-mails, texts, and social media. It is imperative that the IAS professional communicates in a concise, professional, and courteous manner. The tone of the communication impacts how the receiver interprets it.
Based on the readings in this unit, you study the different aspects of planning and drafting message with an intended meaning. Employing an adaptive writing technique and use of positive and courteous tone and language will result in a more clearer understanding of the sender/receiver relationship. Based on the Radical Rewrite: Watch Your Tone! (Guffey & Loewy, p. 58), review the scenario and provide at least five specific writing errors. Include examples.
2.Information security professionals often face complicated situations that require the application of critical thinking in order to solve problems. Provide an example of how critical thinking would apply in a situation specific to your area of interest within information security.
The IT and information security leaders of the Big Retail Data Warehouse were faced with an immediate task of coming up with a plan for how to mitigate and recover from the damage due to the unfortunate breach of their information assets. That may involve bringing in outside information security experts and is likely to involve government or law-enforcement security professionals. Discuss how critical thinking might be applied by a security professional in your area of interest who might be asked to participate in the mitigation and recovery from the incident.
Explanation / Answer
Security is a paradox. It is often viewed as intrusive, unwanted, a hassle, or something that limits personal, if not professional, freedoms. However, if we need security, we often feel as if we can never have enough. Security Management: A Critical Thinking Approach provides security professionals with the ability to critically examine their organizational environment and make it secure while creating an optimal relationship between obtrusion and necessity. It stresses the benefits of using a methodical critical thinking process in building a comprehensive safety management system.
Any IT professional needs to fully explore the available security technologies and stay up to date with them. But they also need to think through the risks that may arise in all relevant aspects of an organization’s operations which may impact security, including human factors, web services, and system upgrades.
You also need to be able to plan for when things do go wrong. Again, this needs an understanding of attackers’ motivations and employee weaknesses, as well as of the technologies available to circumvent your defences, and a sense of how these could evolve. It also requires an understanding of the legal frameworks and technologies relevant to digital forensics, which are essential when responding to cybersecurity incidents. Only then can effective plans be made.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.