- Information assurance is critical for businesses. Determine whether businesses could benefit from applying CNSSI-4009 guidelines to define internal policies and procedures. Explain why or why not.
- Discuss the advantages and disadvantages of SIEM systems to business environments. Determine whether you would consider SIEM systems sufficient for information assurance. Explain why or why not
- Activity trail, with real-time auditing, includes who, what, where, when, and perhaps why (5Ws). Determine which of the 5Ws, in your opinion, is the most important and why. Explain what is the most effective method of managing 5Ws and why.
- Determine which part of information assurance (privacy, regulatory and standards compliance, auditing, business continuity, and disaster recovery) you would rate as the most critical for information assurance. Explain why.
Research and create a write up for your supervisors that includes the following: What is Maslow's Hierarchy of Needs? What motivates people in each level of Maslow's Hierarchy? Provide an example of what could be done to move a person to a higher level of the hierarchy within your work group. Are there other contemporary models out there like Maslow's? If so, explain what it is. Briefly describe the TPM waterfall method. â€¢ Briefly describe one or more Agile project management approaches. â€¢ Compare and contrast TPM and Agile methods, emphasizing the strengths and weaknesses of each. â€¢ Discuss what kind of projects would be more appropriate for TPM approaches and what types would be more appropriate for Agile