Telecommunications and Information Systems Security

Telecommunications and Information Systems Security

Telecommunications and Information Systems Security

Please make sure that the answers to each question is numbered.

Week 4 discussion questions
1A. From the e-Activity, discuss how the NSTISSP national policies facilitate the confidentiality, integrity, authentication, and non-repudiation of computing security.

1B. Analyze the elements of vulnerability and threat (physical, procedural, policy, etc.) that exist in an IS or telecommunications system. Suggest corresponding protection measures.

2A. The Payment Card Industry Data Security Standard (PCI DSS) is used by credit card companies to ensure the safety of the customer data. Assume that you are a merchant. Determine the advantages and disadvantages of adopting the PCI DSS standard.

2B. Suggest methods that organizations could implement to prevent the A1-Injection(Structured Query Language (SQL) Injection) and A2-Cross Site Scripting (XSS) in software applications.

Answer Preview-Telecommunications and Information Systems Security

Telecommunications and Information Systems Security

 

$5.00

Posted

in

by

Tags: