Remote access to corporate resources is becoming commonplace.
From an auditing perspective, suggest two (2) or more controls that
should be in place to prevent the loss or theft of confidential
information.
Give your opinion on what you believe are the essential elements of
an acceptable use policy for remote access. Elaborate on each item
and justify its importance.
===============================================
CIS 349 Week 9 Discussion
FOR MORE CLASSES VISIT
www.cis349rank.com
Data Center Management" Please respond to the following:
Imagine you are an IT security specialist of a large organization
which is opening a new data center. Recommend a minimum of
three (3) controls, other than door locks, you would utilize to secure
the new data center physically. Support your recommendations.
Recommend a process to govern obtaining, testing, and distributing
patches for operating systems and applications within the new data
center. Provide your rationale
===============================================
CIS 349 Week 10 Discussion
FOR MORE CLASSES VISIT
www.cis349rank.com