First Page:Describe the purpose and importance for the FERPA and HIPAA compliance acts. How has training of security officers improved or not since 9/11? Provide three factors why training is essential in high performance security programs. Lastly, identify and assess countermeasures used by organizations to mitigate electronic espionage.
Second Page: Describe possible workplace violence incidents related liabilities a manager or organization may face. Also list and briefly describe the possible motivations for terrorism.
Third Page: In detail, describe how the concept of cloud computing may assist security managers in the future. Give three examples of how the concept of concentric layers applies to the design and application of access control and computers.