Policy Implementation
Consider information security risks, including:
- Cybercrime and cyber-related crimes
- Social engineering
- Mobile computing
- BYOD (Bring your own device).
Write a 3 full page evaluation (not including the title and reference pages) of security technologies and methodologies that can be used to mitigate each of the above information security risks. Support your paper with appropriate references and follow APA format.
Include the following for each type of risk:
- Description of the risk
- Security technologies and methodologies that can be used to mitigate them
- Rationale describing how the risks are mitigated to an acceptable level
preview of the answer..
The day to day activities of people and organizations are increasingly dependent on interconnected as well as automated systems to carry out functions that are vary in nature, ranging from financial services, healthcare records, among others. The benefits of such exploitation of the modern technology are improved communication and enhanced the flow of information in the different levels of organizations in the private as well as the public sectors. The use of technology also improves governance in general management. However, the features of the technology beneficial to the institutions for the various functions- the fast speed of accessing, feeding and processing the information also make information technology …
1027 words APA