Unit6_ IT541 - Unit 6 1 Running Head: UNIT 6 PROJECT...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Unit 6 1 Running Head: UNIT 6 PROJECT QUESTIONS Unit 6 Project Questions from the Book Jennifer Angel Kaplan University IT541 Computer and Network Security Dr. Steven Case February 16, 2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Unit 6 2 Abstract Risk, it's an everyday occurrence many companies face in the internet world. Allowing users within the company to access the outside internet through the company's web server poses a risk each time someone goes out of the protected environment. Security breeches are becoming more common in the modern world. This paper through careful study and research will attempt to answer the questions below.
Background image of page 2
Unit 6 3 Unit 6 Questions from the book 13.1 Table 13.3 is an extract from the Technology Risk Checklist, published by the World Bank to provide guidance to financial institutions and other organization. This extract is the physical security checklist portion. Compare this to the security policy outlined in Figure 13.3. What are the overlaps and the differences? Do your security policies restrict physical assess to networked system facilities? - section 5.2.7 Are your physical facilities access-controlled through biometrics or smart cards, in order to
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 4

Unit6_ IT541 - Unit 6 1 Running Head: UNIT 6 PROJECT...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online