Problem Set A
1
.
Your company is receiving bad press because they allowed another business access to their customer mailing list. Which domains in the Responsible Computing Framework should you focus on to resolve this issue?
2
.
The security and control of your company starts with an information security policy. Explain what this policy should include.
3
.
Your company uses PaaS for data analytics and is experiencing a bandwidth issue. How will you resolve this?
4
.
The president of your organization has informed you that most of the threats to the organization’s network are from insiders. As the chief of your organization’s cybersecurity team, how will you deal with this?
5
.
Your organization deals with sensitive information, and you must ensure that this information is accessible only by authorized personnel. Explain how you could use cryptography to achieve this.
6
.
You learned that your web designer is using his pet’s name as his password to log into the Internet and conduct maintenance on your organization’s website. What policies will you require the web designer to follow to develop a stronger password that is less likely to be misused by hackers and other malicious actors?
7
.
Identify specific scenarios or issues encountered in web/mobile solutions and explain how they can be addressed by responsible computing.
8
.
Identify specific scenarios or issues encountered in cloud solutions, and explain how they can be addressed by responsible computing.
9
.
Identify specific scenarios or issues encountered in smart ecosystems solutions and explain how they can be addressed by responsible computing.