Monday 25 September 2017

CIS 542 Week 7 Discussion

CIS 542 Week 7 Discussion



"End-Point Device Security" Please respond to the following:
  • Assume you are an IT Manager in charge of developing policies for your organization’s upcoming BYOD usage announcement.  Policies could include categories such as devices supported, passwords, employee use, applications, expense reimbursement, etc.  What are the top five (5) policies that you would include?  Be sure at least one (1) of the policies involves security.
  • Determine what you believe to be the top three (3) physical security risks for endpoint devices. Create a list of three (3) best practices that you would follow in order to secure your devices, physically and otherwise

























"End-Point Device Security" Please respond to the following:
  • Assume you are an IT Manager in charge of developing policies for your organization’s upcoming BYOD usage announcement.  Policies could include categories such as devices supported, passwords, employee use, applications, expense reimbursement, etc.  What are the top five (5) policies that you would include?  Be sure at least one (1) of the policies involves security.
  • Determine what you believe to be the top three (3) physical security risks for endpoint devices. Create a list of three (3) best practices that you would follow in order to secure your devices, physically and otherwise



"End-Point Device Security" Please respond to the following:
  • Assume you are an IT Manager in charge of developing policies for your organization’s upcoming BYOD usage announcement.  Policies could include categories such as devices supported, passwords, employee use, applications, expense reimbursement, etc.  What are the top five (5) policies that you would include?  Be sure at least one (1) of the policies involves security.
  • Determine what you believe to be the top three (3) physical security risks for endpoint devices. Create a list of three (3) best practices that you would follow in order to secure your devices, physically and otherwise


"End-Point Device Security" Please respond to the following:
  • Assume you are an IT Manager in charge of developing policies for your organization’s upcoming BYOD usage announcement.  Policies could include categories such as devices supported, passwords, employee use, applications, expense reimbursement, etc.  What are the top five (5) policies that you would include?  Be sure at least one (1) of the policies involves security.
  • Determine what you believe to be the top three (3) physical security risks for endpoint devices. Create a list of three (3) best practices that you would follow in order to secure your devices, physically and otherwise

No comments:

Post a Comment

Note: only a member of this blog may post a comment.

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...