Discussion 1 Access control starts first with assessing risks so you can properly identify potential threats and determine how to mitigate those risks. Your CIO has asked you to conduct

Discussion 1 Access control starts first with assessing risks so you can properly identify potential threats and determine how to mitigate those risks. Your CIO has asked you to conduct a risk assessment on a newly acquired division that works on product development and has their own servers that will be joined into the existing network. Share your findings with your classmates, provide any links to any useful resources you find, and make sure you cover all three aspects of the topic. Discussion 2 All aspects of a business are vital, though some have more impact on the bottom line. Permissions and access control are given based on what users need and not on what they want. This is called the policy of . Based on this week’s reading, answer the following question: Federal and State laws act as a deterrent to information theft but also make it necessary for businesses to protect sensitive data. There are penalties for stealing information, as well as penalties for failing to protect it.

Do you need us to help you on this or any other assignment?


Make an Order Now