Problem Set B
1
.
Your company has asked you to lead a team that will develop a network system that incorporates the company services within applications, has the ability for computers in one division to interact with computers in other divisions, can adapt as new standards and practices are implemented, and will be able to survive if the system experiences an attack or disruption of service. Which qualities is your company most concerned about?
2
.
Your company does business with several customers who access the company’s system using IoT devices. Explain to your supervisor why this is a security concern?
3
.
Your company wants to expand into 3-D modeling, but you are concerned about data management. Explain to your supervisor why data management is an issue with 3-D modeling.
4
.
Your organization has begun using the Cloud to share files, creating cybersecurity issues. As the cybersecurity chief, you have decided to assign a central policy administrator who will make security decisions about each file before it is shared. How will you achieve this?
5
.
Your organization is executing contracts through the metaverse, and you need to verify information without providing access to the data supporting the contract. How can you achieve this?
6
.
You’ve learned that one of your employees has been accessing your company’s website but is hiding their IP address by using a public Wi-Fi network. Why is this a concern, and how will you address this?
7
.
You inherited your grandfather’s business and intend to launch a website to promote the business and handle Internet sales. Prepare a cybersecurity policy that outlines how you will apply the pillars of responsible code and responsible data usage to your new website.
8
.
As your grandfather’s business evolves, you begin conducting business in the Cloud. What changes will you make to your cybersecurity policy to apply the pillars of responsible code and responsible data usage to your Cloud operations and why are you making these changes?
9
.
As your grandfather’s business grows, you attract customers in Japan. Explain how you will use responsible computing to respect Japan’s efforts to develop a super-society.