Question: Please read the below article titled VA Ignores Cybersecurity Warnings https://www.pcworld.com/article/126093/article.html Note: When reading the article, place yourself in the position of the person called
Please read the below article titled VA Ignores Cybersecurity Warnings
https://www.pcworld.com/article/126093/article.html
Note: When reading the article, place yourself in the position of the person called to prevent the situation from happening again. Where do the vulnerabilities begin?
Discuss the following questions:
1)What laws have been violated?
2)What do you think contributed to the problems that could lead to a violation of these laws?
3)What are the implications to the individual and organization of these violations?
4)What are some security controls and mitigation strategies for handling future violations? (Name three to five)
5)How does privacy law differ from information systems security?
please help me answers for the above questions
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
