question archive Answer all questions in your own words Do not copy any text from the notes readings or other sources The assignment must be your own work only Title: Proposing questions to assess your organization’s security technology Question In Module 3, you were introduced to the critical systems, networks, and data that organizations depend on to achieve their business goals
Subject:Computer SciencePrice:19.99 Bought21
Answer all questions in your own words Do not copy any text from the notes readings or other sources The assignment must be your own work only Title: Proposing questions to assess your organization’s security technology Question In Module 3, you were introduced to the critical systems, networks, and data that organizations depend on to achieve their business goals. In this module, you explored the various types of security technologies that are designed to protect organizations’ critical systems, networks, and data. For this online activity submission, you are required to combine information from both Module 3 and Module 5 to answer the following questions: • Based on the Module 3 ongoing project, provide a brief overview of the critical systems, networks, and data your organization (Write approximately 150 words) Using your learnings from the Module 5 Unit 3 Notes, and your input from the small group discussion forum, compile 10 questions you would direct to the chief information officer (CIO), chief information security officer (CISO), or chief technology officer (CTO) in your organization to understand the technologies that have been or should be implemented to protect critical systems, networks, and data. (Write approximately 500 words). Identifying questions that highlight an organization’s cybersecurity technology (Make 2 different write up on this and each write up must not be more than 150 word.) list of types of questions the chief executive officer (CEO), chief information security officer (CISO), chief information officer (CIO), or chief technology officer (CTO) of your organization needs to answer about the security technology you are using (or need to invest in), and how it is postured to best mitigate risk to cyberthreats.