“INTERNATIONAL BUSINESS ETHICS” on this key term conduct a search online Library resources to find 1 recent peer-reviewed academic journal article (within the past 3 years) that closely relate to

After reading this week's materials, please respond to one or more of the following questions.

1.Describe the main components of a CCTV system. What are some of the concerns with CCTV deployments?

2.Define the different types of trusted recovery. What is meant by the term fail secur ?

3.What is Change Management and how is it used to control security breaches? What is Configuration Management and how is it used to control security breaches? What is Patch management and how is it used to control security breaches?