posted by mike on .
Information systems security?
For the scenarios that follow,identify the data that would need to be protected.Recommend how you would implement one or more of the following controls for the given scenario and justify your recommendation.
2.Logical and technical controls
(1) Confidential services inc.is a military support branch consisting of 14.000.000 computers with internet access and 250.000 servers.All employees must have security clearances.and they communicate using Blacberry devices and e-mail.
(2) Backordered parts is a defense contractor that builds communication parts for the military.All employees communicate using smartphones and e-mail