Saturday, June 15, 2019
Discussions Week 1-3 CIS462 Coursework Example | Topics and Well Written Essays - 750 words
Discussions Week 1-3 CIS462 - Coursework ExampleEmployees demonstrating the highest level of acceptance to policies get unearned or monetary compensations. Another method would involve provision of training programs that increase employees knowledge regarding the workplace policies. Lastly, acceptance can be improved finished participative decision making. Managers should involve subordinate employees in formulation of policies (Lindsey, 2012). Potential challenges during implementation of these acceptance methods include but not limited to financial constrains and cultural barriers. in spite of appearance an organization, security control measures are classified as technical measures, administrative measures or physical measures. Physical controls include things kindred door locks and fences for restricted access, speckle technical controls include authentication details like login information. These classifications contain control measures which are incumbrance, corrective or detective in nature. Within an organization, preventive controls like passwords deter unauthorized access of information. Detective measures like alarms notifies of security breaches while corrective controls like backup servers limit damages resulting from security breaches (Lindsey, 2012).Technical preventive measures feature as the most challenging control measures to implement. As mentioned earlier, preventive measures under the technical category include use of authentication details and antivirus software. Because of development in information technology, new programs and software that can bypass authentication barriers emerge regularly. In this case, redundancy of preventive controls undermines prolonged data security (Lindsey, 2012). oneness way of overcoming this redundancy challenge would involve regular updating of technical controls.The Childrens Internet protection Act, abbreviated as CIPA, protects minors from access to abominable online content. Technically, CIPA r equires institutions like
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.