2) 1] Confidentiality: The public should not have access to this Information.
2] Integrity: Information should be accurate at all times.
3] Availability: Able to access and modify Information when needed.
4] Storage: Information should be stored in a secure server.
5] Processing: Reflect changes made to the Information.
6] Transmission: Information should be encrypted.
7] Policy: Permission levels for certain Information.
8] Education: Training staff in the security of personal Information.
9] Technology: Encryption software is used to transmit Information
3) CIO: Tom Janicki
CISO: Canít find this one
Systems Admin: Ross Eaton
††††††††††††††† CIO: Atish Banerjea
††††††††††††††† CEO: Mark Zuckerberg
††††††††††††††† CISO: Alex Stamos
††††††††††††††† Mark (CEO) was definitely the easiest to find but the hardest was finding Atish (CIO)
5) Mitnick hacked into Pacific Bell voice mail computers. The FBI arrested Mitnick on February 15, 1995, at his apartment in Raleigh, North Carolina, on federal offenses related to a 2Ĺ-year period of computer hacking which included computer and wire fraud. He was found with cloned cellular phones, more than 100 clone cellular phone codes, and multiple pieces of false identification. Mitnick was charged with wire fraud (14 counts), possession of unauthorized access devices (8 counts), interception of wire or electronic communications, unauthorized access to a federal computer, and causing damage to a computer.
6) Iterative and incremental development and Agile Development are both processes in which a software gets upgraded or experiences a new iteration/generation of patches or updates.