Describe-the-risks-in-poor-data-classification-and-what-should-be-done-about-it
20-Discuss the downside of security intelligence and how we might alleviate?
19-Describe the risks in poor data classification and what should be done about it?
18-Name and describe 3 areas of focus not normally thought of as a responsibility of security operations.?
16-As stewards of the code of ethics, security operations should do what to address the weakest link in the security chain and the potential social engineering influences?
15-Name the dangers of not establishing system life cycle policies within your organization.?
14-What three general criteria define the logical access policy of an organization? And what are their implications?
11-Name 5 information security defensive strategies.?
13-What is the “Kill Chain†and how does it help the fight against malicious software?
10- Name 3 ways the cyber security community is trying to gain ground against the bad guys?
9-What is the number one vulnerability to the IT domain?
8-Where is the dark web? And what makes it so attractive to the nefarious?
7-What Black Hat attack aspect or characteristic makes the hacks very hard to detect and trace back?
6-How does BYOD popularity in computing domains affect information security strategies?
5-What are the three tenants of information security and how do they apply?
4-What is the difference between targeted, adversarial, infrastructure and capability attacks?
3-Name three motivations driving cyber security defense efforts in today’s highly inter-connected world?