Identify the four separate stages of implementation strategy for security systems.

What will be an ideal response?


1. Security audit: Examines processes, infrastructure, and applications to determine if security weaknesses exist
2. Technology audit: Measures the available technologies and applications against those that are needed
3. Planning and implementation: Should consider the organization's operational processes and those employees who use them
4. Training and monitoring: Users must be thoroughly trained in and monitored for acceptance of the security provisions

Computer Science & Information Technology

You might also like to view...

Critical tasks have slack

Indicate whether the statement is true or false

Computer Science & Information Technology

________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies

A) Affective computing B) Crowdsourcing C) Crisis-mapping D) Social networking

Computer Science & Information Technology

Give a command line for displaying files called got|cha and M*A*S*H screenful at a time.

What will be an ideal response?

Computer Science & Information Technology

Even after a file is emptied from the Recycle Bin, there remains an entry for that file in the MFT

a. True b. False

Computer Science & Information Technology