?Your company has acquired Joggers PLC, a smaller company. The integration of the information systems can take up to 6 months, and until then Joggers PLC workers will continue following their policies. You have been tasked with ensuring that their IT practices will be safe and lead to a secure system. What advice would you give your manager regarding information security policies?
What will be an ideal response?
?I would ensure Joggers' infrastructure is well protected by firewalls, anti-virus software, and updated applications. I would enforce a password policy to make guessing the passwords improbable. I would recommend they institute a data backup policy that will make daily, weekly, and monthly backups of all the data. I would also make data access restricted to users' roles.
Computer Science & Information Technology
You might also like to view...
Data-flow diagrams trace all data in an information system from the point at which data enter the system to their final resting places
Indicate whether the statement is true or false
Computer Science & Information Technology
A cell is the intersection of a column and a row
Indicate whether the statement is true or false
Computer Science & Information Technology