“IT
Security” Please respond to the following:

• From the
e-Activity, discuss how the National Security Telecommunications and
Information Systems Security Policy (NSTISSP) national policies facilitate the
confidentiality, integrity, authentication, and non-repudiation of computing
security.

• Analyze
the elements of vulnerability and threat (physical, procedural, policy, etc.)
that exist in an IS or telecommunications system. Suggest corresponding
protection measures.

“IT
Influence” Please respond to the following:

• The
Payment Card Industry Data Security Standard (PCI DSS) is used by credit card
companies to ensure the safety of the customer data. Assume that you are
amerchant. Determine the advantages and disadvantages of adopting the PCI DSS
standard.

• Suggest
methods that organizations could implement to prevent the
A1-Injection(Structured Query Language (SQL) Injection) and A2-Cross Site
Scripting (XSS)in software applications.