Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

* Write a speech that you would give to a friend in an elevator summing up the c

ID: 3908691 • Letter: #

Question

* Write a speech that you would give to a friend in an elevator summing up the contents of this course. You have 30 – 90 seconds to inform your friend of the most important elements. Go!

* The textbook identified several areas of information systems security policies. Sum up the most important concept that you learned in 160 characters or less.

Course: Operations security

Textbook:

Johnson, Rob. Security Policies and Implementation Issues, Second Edition. Jones and Bartlett Learning, 2015.

* Write a speech that you would give to a friend in an elevator summing up the contents of this course. You have 30 – 90 seconds to inform your friend of the most important elements. Go!

* The textbook identified several areas of information systems security policies. Sum up the most important concept that you learned in 160 characters or less.

Course: Operations security

Textbook:

Johnson, Rob. Security Policies and Implementation Issues, Second Edition. Jones and Bartlett Learning, 2015.

Explanation / Answer

Information system security has been identified as the necessity of any organization be it It based or not. Therefore, there is a need to formulate policies and follow protocols as well as utilize technology in order to be able to essentially allow the best possible defence to be created. Information security can then be combated by the use of technology such as:-

1. Access control system: which only allow people with the right clearance level to view the information.

2. Firewall and encryption: which can save the system from network intrusion and can safeguard the data as well.

3. Intrusion detection system: which will provide the resources for the system to manage unusual activity as well as alert the security personnel of this threat

If we need to be secured from the threat we need to be educated about the policies that allow us to safeguard ourselves and follow a set system and protocol. In the case, the threat to our data ever arises.

?