Proposal p. 1
Pick A Name
Date of proposal:
Chocolate candies are a mid-size candy company that has acquired a manufacturing
company that makes many sorts of candies. This consu
Week 5 DQ 1 AND 2
What are two of the best practices for developing secure software and systems? Why
would each practice be suitable for an organization to implement to strengthen its
information security posture? Describe the benefits of each.
Week 4 DQ 1 AND 2
What is the value and effect of a good business impact analysis? How can using this help
an organization develop an effective information security policy?
A business impact analysis can identify critical systems, services, or ev
Week 3 DQ 1 AND 2
What are three controls that would be effective in protecting health care information? For
each item, describe the risk in your own terms and how the controls address that risk.
Also, discuss how applicable the same risks and co