1. One of the most significant and common threats is the
insider threat. What actions do you think is appropriate for security an
organization regarding the insider threat?
2. Imagine you are the new CEO of a toy Research
& Design Company. Your company was in the process of creating an
electronic gaming toy and the final protocol plans have been developed. You are
not sure what security protocols are in place. What is your approach for
securing the data from an outside threat?