You are on page 1of 1

Week 2 DQ1: Why is managing technical vulnerabilities so important to an organization managi ng their security environment?

What are some ways to mitigate those vulnerabilit ies? DQ2:: Based on the Barr (2011) article, why is identity management considered the cent ral component of access management and security strategies? Should identity mana gement focus on role-based access control (RBAC)? What has the greatest positive impact on enterprise data protection (EDP), identity management, or encryption?

INDIVIDUAL ASSIGNMENT: Using various Internet sources, find an article or website on an information sec urity topic that is of interest to you. Prepare a 1-2 page paper evaluating the article or website. Refer to the note on Evaluative Writing below. Evaluative Writing requires students to take a stand on the quality of the material being evaluated. Provide an introduction, and select various aspects of the arti cle or website. Describe each aspect, providing comments on the usefulness, vali dity or appropriateness of the article or website. The evaluation should provide details, examples and/or reasons for your viewpoint.

You might also like