posted by .

Information systems security?

For the scenarios that follow,identify the data that would need to be protected.Recommend how you would implement one or more of the following controls for the given scenario and justify your recommendation.
1.Administrative controls
2.Logical and technical controls
3.Hardware controls
4.Software controls
5.Physical controls.

(1) Confidential services a military support branch consisting of 14.000.000 computers with internet access and 250.000 servers.All employees must have security clearances.and they communicate using Blacberry devices and e-mail.

(2) Backordered parts is a defense contractor that builds communication parts for the military.All employees communicate using smartphones and e-mail

Respond to this Question

First Name
School Subject
Your Answer

Similar Questions

  1. com215

    Read the 4 scenarios under "Getting Started," on page 311 in Business and Administrative Communication (7th ed.). Choose 1 of the 4 scenarios. Post your response to this 2-part question: Identify one or more ways that the cultural …
  2. Management 330

    o Identify four types of control mechanisms (ways controls are applied) used in your selected organization. o Compare and contrast these control mechanisms. o Determine the effectiveness of these control mechanisms. o Examine the positive …
  3. Finance

    Imagine the CFO of a company has asked you, the auditor, to review the internal controls for cash receipts and to evaluate its cash management of accounts. Prepare a one page letter to the CFO addressing the following questions: 1. …
  4. accounting

    Write a 3-4 page paper that summarizes your findings from the four (4) scenarios as well as how using Microsoft Excel helped you with this process, using the following outline: 2. Summarize the various accounting systems that each …
  5. Health care Information System, Question 3

    From your own Internet research, to find a report card for one or more of your local hospitals. "Using Information" Please respond to the following: Create a very brief scenario (1-2 sentences) in which specific information should …
  6. Human Biology please help

    Cross section of the brain Located in the forebrain, the (A)__________ is responsible for controlling homeostasis and making adjustments in how the organs work. While the rest of the brain is protected from viruses, bacteria, toxins, …
  7. Information systems security

    What do I put in my enterprise security plan proposal?
  8. Economics

    1. What determines the size of the key-money payments that landlords demand (and tenants offer) for the right to rent a controlled apartment?
  9. Business mtivation & control

    What area of the control pyramid requires a human response?
  10. UMUC

    identify the data that would need to be protected. Recommend how you would implement one or more of the access controls (listed after the scenarios) for the given scenario and justify your recommendation. Scenarios:

More Similar Questions