Attachment # 00010145 - Information_Technology_Security_1_Week_5_Essay.docx
Information_Technology_Security_1_Week_5_Essay.docx (18.75 KB)
Raw Preview of Attachment:
(refer to the detailed question and attachment below)
Information Technology Security IWeek 5: Security Policies PaperConsider the following scenario:Hector is a security administrator for a defense contractor. This business frequently works with highly sensitive, classified material. Hector has developed a policy for departing employees. This policy handles everything mentioned in this chapter: All logon accounts to any server, VPN, network, or other resource are disabled. All keys and access badges to the facility are returned. All accounts for email, Internet access, wireless Internet, cell phones, and so on are shut off. Any accounts for mainframe resources are cancelled. The employee’s workstation hard drive is searched.Assignment: Write a one-page paper that discusses the following questions. Apply knowledge learned in this week's readings. Given the highly sensitive nature of the work at this company, what other actions might you add to this policy? Give the reasons for your recommendations

Week 5 Essay

Question # 00416170 Posted By: chiquetta28 Updated on: 10/30/2016 04:16 PM Due on: 11/03/2016
Subject General Questions Topic General General Questions Tutorials:
Question
Dot Image

I need this assignment completed by Thursday and I already have someone to do it. I work with the same person each week. If I don’t give the person the okay to do the assignment don’t just volunteer and do it on your own Thanks.

Dot Image
Tutorials for this Question
  1. Tutorial # 00413896 Posted By: Davidcharles Posted on: 11/04/2016 04:15 AM
    Puchased By: 3
    Tutorial Preview
    The solution of Week 5 Essay...
    Attachments
    Security_Policies.docx (18.99 KB)
Whatsapp Lisa