Any topic (writer's choice)
Instructions
Security policyAccess a public computer in either the library, computer lab, or classroom.Find examples of files or data that other users have left behind. The files can be apparent, temporary, browser based, cached, or document metadata. Document your findings.What should you do if you discover personal information?Security palnning The primary tenets of information security are represented by the triad C-I-A. Discuss the importance and impact of each of the tenets as they relate to an organization's data. Is there one tenet that is more important than another? Why, or why not?Cyber warfareScenario: The security facilities manager has asked for your recommendations on what additional outside perimeter security devices are needed to protect the building, surrounding area, and people. What are your recommendations? Why do you believe these recommendations are adequate? Discuss and defend your recommendations.
Answer

Why we are Ranked the best
- Unlimited Revisions
- Free 24/7 Support and chat
- Money back guaranteed
- Low prices with discounts
- Experienced writers.
- Free Unlimited support