In: Computer Science
Information Technology (IT) Security
Define your chosen type of security in your own words.
Does the...
Information Technology (IT) Security
- Define your chosen type of security in your own words.
- Does the term shrinkage relate to your type of
security? If so, how? (If not, please omit this portion from your
response.)
- What challenges and risks exist for this type of security?
- How are the risks mitigated? Tracked? Eliminated?
- What types of internal and external factors exist?
- What key strategies are used to protect assets, personnel, and
infrastructure?
- Please be sure to outline prevention and response
strategies.
- Describe the policies and procedures that are in place to
support prevention and response efforts.
- Briefly describe the tools and technology used to complete
daily tasks. (We will discuss intrusion detection systems and
security systems in depth in Unit 4).
- What types of systems and communication tools are in place for
communication with outside entities and authorities (e.g., local,
state, federal)?
- What legal authority does the security force have in your
selected industry?
- What legal authority challenges exist?
- Does this type of security have local, state, or federal
authority?
- Can public and private security personnel be employed in this
type of security?
- Outline the requirements and opportunities available.