Another important issue: Security! Jesse wants my thoughts on how SCR should manage IT security. She wants me to consider all six levels, and prepare an outline for a corporate security policy.

What will be an ideal response?


Students should be able to include suggestions and examples in each of the six security levels.

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 1Professor Trapani has created a series of word problems which his students need to express using comparison operators. Dr. Trapani wants students to identify all records in their databases that have a creation date after January 15, 2009. Assuming that the variable name is CreationDate, what is the condition?

A. CreationDate > 01/15/2009 B. CreationDate >= 01/15/2009 C. CreationDate >= #01/15/2009# D. CreationDate > #01/15/2009#

Computer Science & Information Technology

A virus that is triggered by the passage of time is called a ________

A) macro virus B) time bomb C) logic bomb D) worm

Computer Science & Information Technology

?At the end of the systems implementation phase, the final report to management should include _____.

A. ?final versions of all system documentation B. ?hardware efficiency and platform performance C. ?adequacy of system controls and security measures D. ?quality and effectiveness of training

Computer Science & Information Technology

Which one of the following is a disadvantage of placing security within IT?

A. It is attractive because security and IT possess many of the same qualities and technological skills B. Security has no independence from IT and it is hard to blow the whistle on security issues occurring within the IT department or by the CIO C. The centralizing of security and IT under the CIO D. The CIO would have IT implement security and is likely to back the security department in its effort to create a strong and safe information system for the organization

Computer Science & Information Technology