· Identify the Gramm-Leach-Bliley Act (GLBA) requirements for implementing the administrative, technical, and physical controls necessary to protect nonpublic personal information
· Determine the requirements for handling nonpublic personal information and understand the GLBA guidelines on how to properly secure this data
· Investigate how GLBA has impacted security controls for protecting nonpublic personal information and financial information
· Write a 2–3-page APA-formatted essay that defines a process for obtaining and addressing GLBA compliance information for a financial organization’s audit
Written Essay Assignment 2-3:
· Recognize risks, threats, and vulnerabilities commonly found in the Workstation Domain
· Identify Workstation Domain-known vulnerabilities and exploits on the Common Vulnerabilities & Exposures (CVE) database listing of common vulnerabilities and exploits
· Write a 2–3-page APA-formatted essay that describes how risks, threats, and vulnerabilities or misconfigurations at the operating system level in the Workstation Domain might expose that workstation
Leave a Reply