This preview shows page 1. Sign up to view the full content.
Unformatted text preview: A clear end user policy gives the corporation the ability to protect the front lines of its network. The easiest way to get into a computer is through the end users mistakes. It should include how the computer should be used and what functions it should perform. 3) Name all of the individual security holes/breeches/violations that you found in the case. How many did you find? (Sure you found them ALL) What specific measures are necessary to correct each one? 4) Why might it have been so easy to install spyware software in this case? It was so easy to install spyware software in this case because they had direct access to the networks servers...
View Full Document
- Spring '08