CCSI 360 “You Decide” Assignment Week 2
Section 1- The Role of the Corporate Privacy Officer and Information Security Officer during Whistle-Blowing Events and Measures Used to Protect Whistle Blowers from Retaliation
The roles of the Company Privacy Officer, in this case, Mr. Bart Oliver and Information Security Officer, in this case, Mrs. Martha Massey should be as follows:
Company Privacy Officer- The Company Privacy Officer (CPO) shall oversee all of the activities related to the development, implementation, maintenance, and the adherence to the organization’s policies and procedures covering the privacy of, and ...view middle of the document...
A cybercriminal is an individual who commits crimes where he or she uses a computer as a tool or as a target or as both. The computer is used as a weapon to commit crimes such as fraud, blackmailing, and theft.
Section 4- Technology certifications and their value
Technology certificates are essential in the IT field and their value may be enormous. The certificates are many times required for a worker to advance positions in their office. There are countless certificates available in many different areas of information technology. In the computer forensics field some of the more desirable and valuable certificates are:
1. Certified Computer Examiner (CCE)
2. Computer Hacking Forensics Investigator V8 (CHFI)
3. Certified Forensic Computer Examiner (CFCE)
4. GIAC Certified Forensic Examiner (GCFE)
5. GIAC Certified Forensic Analyst (GCFA)
6. Professional Certified Investigator (PCI)
Section 5- Inappropriate use of computing systems
One of the largest information security issues facing businesses today is the inappropriate computer use of computing systems in the workplace. There are many different ways an employee can misuse a computer and the severity and risk for the business depends on the action of misuse by the user. Some of the more...