Discussion 3- Access control

Cost benefit analysis hypothetical situation.  Select an access control based on a hypothetical situation and justify the cost based on the risk .  Some example situations could be implementing multi-factor authentication for an email system or a badge reader for a data center (feel free to get creative).  APA formatting is expected for any references.  Initial posts due by Thursday end of day and two peer responses due by the end of the unit.  

preventing attacks on web applications_FP

 Write about preventing attacks on web applications

This project consists of 3 parts:

1. An annotated bibliography of at least five sources. The annotations must be at least five sentences long.

2. A PowerPoint with at least 12 slides not including the title and references addressing the topic approved in your Final Project Proposal.

3. A 700 word summary of your findings. This must be appropriate for graduate-level work. It should not be a survey. Please, do not double space your submission.

Discussion 11 – erm

The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

Please make your initial post of 500 to 600 words .

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.