?Your company has acquired Joggers PLC, a smaller company. The integration of the information systems can take up to 6 months, and until then Joggers PLC workers will continue following their policies. You have been tasked with ensuring that their IT practices will be safe and lead to a secure system. What advice would you give your manager regarding information security policies?

What will be an ideal response?


?I would ensure Joggers' infrastructure is well protected by firewalls, anti-virus software, and updated applications. I would enforce a password policy to make guessing the passwords improbable. I would recommend they institute a data backup policy that will make daily, weekly, and monthly backups of all the data. I would also make data access restricted to users' roles. 

Computer Science & Information Technology

You might also like to view...

What does a layer clipping mask do?

What will be an ideal response?

Computer Science & Information Technology

Which theory is used with surge strips?

A) Chaos theory B) Logical theory C) Binary theory D) Theory of least resistance

Computer Science & Information Technology

Using the Auditpol.exe command-line command ________, you can display the current auditing policy

a. /get b. /list c. /show d. /retrieve

Computer Science & Information Technology

Which of the following firewall rule groups will enable the use of the Performance Monitor snap-in?

A. Performance Logs and Alerts B. Remote Service Management C. Remote Event Log Management D. File and Printer Sharing

Computer Science & Information Technology