You are on page 1of 1

Ernieco Jay Ahon

BSIT 3-1
INTE 30063 – Information Assurance Security 1
Professor: Sir. Jeffrey G. Aceron

Case Exercise# 2:
1. How do Fred, Gladys, and Charlie perceive the scope and scale of the new information
security effort?

Fred - He is concerned about cost of the computer security solution and the length of
time it would take to fix.
Gladys - She needed a concrete solution to the dilemma, not just a fast fix as they did the
last time. She demonstrates that they should begin a project schedule to implement a
current information security software while continuing to use their standard systems
management and project development approach.
Charlie - Planned to set up a computer security solution, he was intended to set up a
cyber security solution. He demonstrated that they need a comprehensive evaluation of
their procedures and procedures, as well as the establishment of an integrated risk
management policy.

2. How will Fred measure success when he evaluates Gladys’ performance for this project?
How will he evalute Charlie’s performance?

Gladys and Charlie's performance may be assessed by examining their draft


project schedules and budgets by Fred. It will demonstrate how they intend to tackle the
issue effectively. He may also convene a meeting of their respective departments in order
to get a better understanding of their proposals for implementing an information security
strategy for the company.

3. Which of the threats discussed in this chapter should receive Charlie’s attention early in
his planning process?

Accourding to the Threats mentioned in the Chapter , Charlie should put attention
and focus on human errors and software threats, as the company's computer network was
compromised with a malicious worm last month, prior to the company's outbreak last
month.

Reference: Principles of Information Security, 4th Edition, by Michael Whitman, Herbert


Mattord

You might also like