Why is it critical to have users "buy in" to the policy and willingly follow it?
What will be an ideal response?
Because wireless policies will include the procedures that employees must carry out, it is critical to have users "buy in" to the policy and willingly follow it. The degree to which this is accomplished often hinges upon the employees attitude toward the security policy.
Unfortunately, not all users have positive attitudes about security policies. Users sometimes view security policies as a barrier to their productivity, as requirements that will be difficult to follow, or as a way for management to control their behavior. This is particularly true if policies did not exist in the past or were loosely enforced and now strict policies are established. Part of the reason for these negative attitudes may actually be the result of how users think of security itself.
You might also like to view...
The paste command is used to
a: cut and paste columns in a file b: join files together line by line c: append files d: displays high lighted part of a file e: paste directory files
One way to search for help is to enter search text in the 'Search Help' text box.
Answer the following statement true (T) or false (F)
Why would you enforce referential integrity?
A) To determine which software to use Excel or Access B) To confirm error free data C) To avoid accidental deletion of macros D) So data cannot be entered into a related table until the data is entered in the primary table
________ storage is technology used to store files and work with programs that are accessed through the Internet
Fill in the blank(s) with correct word