Question 1
Develop a strong argument against the adoption of a bring your own device (BYOD) policy for a large financial services organization. Now develop a strong argument in favor of the adoption of such a policy.
Question 2
Draft a legitimate-looking phishing email that would strongly tempt its recipients to click on a link to a Web site or open an email attachment.
Question 3
What is the difference between industrial spying and the gathering of competitive intelligence?
Is the use of competitive intelligence ethical or unethical? Why?
Question 4
Some IT security personnel believe that their organizations should employ former computer criminals to identify weaknesses in their organizations’ security defenses. Do you agree? Why or why not?
Question 5
You have been assigned to be a computer security trainer for your firm’s 2,000 employees and contract workers. What are the key topics you would cover in your initial one-hour basic training program for non-IT personnel? What sort of additional security-related training might be appropriate once people have the basics covered?
Make sure you provide the necessary analysis and supporting facts to support your answers
Develop a strong argument against the adoption of a bring your own device (BYOD) policy for a large financial services organization.