business environment 7




Discussion 1




Write an informative memo to a business manager who does not fully understand the need for security measures. Emphasize the risk of not protecting against known security threats such as social engineering.


Answer the following questions.

100 words

•What role should preparing employees to recognize and respond to social engineering techniques play in the organization’s overall information security program?


Note three specific social engineering techniques. Discuss how they can be recognized and how to best prepare employees for each potential attack.




Discussion 2


Imagine that University of Phoenix’s IT department has hired you. Your first task is to make sure the department is following the most important information security practices.


Write a 2- to 3-page paper highlighting the most important information security practices.


Answer the following questions.


What are three key elements for an organization to consider in strengthening its overall information security posture? Describe how each plays a role in the operations of the entire organization. How do the principles of information security apply to the material examined in the course? How can the systems used throughout the organization enable business and protect the data they contain?




Discussion 3

100 words

How are information systems transforming business, and what is their relationship to globalization?




Discussion 4

100 words

What are business processes? How are they related to information systems?