Identify how government regulations discussed in the textbook relate to the governments national strategy to secure cyberspace. How do COSO and CobiT® vary from ISO 17799? According to FISMA, who is the focal point for information security? Why is this? State and briefly describe the federal regulation that concerns publicly traded companies. Why is testing restoration so critical for small businesses? How would you respond to a small business owner who believes that his/her business is less likely to be attacked precisely because it is so small? Explain the various reasons why users are not allowed to install software on company owned systems.