Access Millions of academic & study documents

Implementing Security Controls

Content type
User Generated
Subject
Computer Science
School
Wilmington University
Type
Homework
Showing Page:
1/5

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/5

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/5

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 5 pages?
Access Now
Unformatted Attachment Preview
Running head: IMPLEMENTING SECURITY CONTROLS Implementing Security Controls Student’s Name Institutional Affiliation Date 1 IMPLEMENTING SECURITY CONTROLS 2 Implementing Security Controls Cybersecurity is one of the most dangerous threats that face network security throughout the world. When the network securities are not well developed, the cyber attackers usually define their mechanisms of accessing crucial information from target organisations that are beneficial to them in various ways. It is therefore important that the management of these networks develops security controls to reduce the risks associated with loss of important data and access into the system by unauthorised people (Killmeyer, 2000). Effective security controls are possible only if the management is capable of developing an appropriate course of actions, principles, and guidelines that will promote the privacy of information. Ideally, this helps to ensure that the information stored within the company’s systems is only accessible to only those within the company only. However, it is important to understand that the security of the desktop information does not only entail protection of the desktop and its data. Nevertheless, comprising with the desktop may attract attempts to break into it and access vital information about the organisation by the cyber attackers. Eventually, this leads to an attempt to identify the necessary components of a strategic plan for desktop security. One of the import ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4