In: Computer Science
An architectural firm of eight employees, each with a networked desktop computer, wants you to develop a security policy for the company. Management has emphasized the ease of use is paramount, and little time is available for training. What level of security should policy reflect?
Answer:
Overview:
Wireless networking has been
important in every enterprise with the adoption of cell devices.
Unsafe wireless setup introduces security bugs that may contribute
to security attacks.
Objective
This policy aims to safeguard the
information of the company.
Area of scope
Policy
General requirements
Adherence
Adherence Evaluation
The IT department can determine if members agree with this strategy through a variety of approaches, including internal assessments, video surveillance, and daily walks.