Assignment: Module 05: Critical Thinking Malware (50 points) For this critical thinking

Assignment: Module 05: Critical Thinking
Malware (50 points) 
For this critical thinking assignment, answer the following questions based on the readings from this module:
How do you determine who needs access to what company data? What happens if we leave all data exposed to all employees? Explain your rationale.
Explain data & information classification and categorization
In your opinion, do you think that companies allow too much access to proprietary data to all employees? Why or why not?
Provide information from your readings to support your statements.
Your well-written paper should meet the following requirements: 
Five pages in length, not including the title and reference pages.
Include two external references in addition to the textbook. Library is a good source for these references.
Your paper must follow University academic writing standards and APA style guidelines, citing references as appropriate.
You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the originality check tool, review the Turnitin Originality Check Student Guide.
Module 06: Discussion Forum
When signing up for a Service Level Agreement, how important is uptime? Describe the differences between 2-9’s and 5-9’s. What are you providing to the company and can you support having almost no downtime with 5-9’s? What are some of the benefits and drawbacks associated with implementing high uptimes? Explain the cost-benefits of 5×9 versus 4×9. When does the option of 4×9 outweigh the benefits of 5×9? Support your answers with information and examples from your text and your experiences.
Include at least two references
Assignment: Module 07: Critical Thinking
 System Security Goals (50 points)
For this critical thinking assignment, answer the following questions based on this week’s module: 
How do you know if your system is meeting your security goals?
You can verify that controls are working, but how do you know if they are getting the job done?
How are you ensuring your security measures are aligning with your organization posture and mission?
What auditing practices or procedures would you implement for your organization? Why?
Provide information from your readings to support your statements.
Your well-written paper should meet the following requirements: 
Five pages in length, not including the title and reference pages.
Include two external references in addition to the textbook. Library is a good source for these references.
Your paper must follow University academic writing standards and APA style guidelines, citing references as appropriate.
You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the originality check tool, review the Turnitin Originality Check Student Guide.
Please avoid plagiarism because the work will cheek in Turnitin