Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Discussion Homework 2
"Today's state-of-the-art network security appliances do a great job of keeping the cyber monsters from invading your business. But what do you do when the monster is actually inside the security perimeter? Unfortunately, all of the crosses, garlic, wooden stakes, and silver bullets in the world have little effect on today's most nefarious cyber creatures" (Manky, 2010).
Review the Office Security Violations media and identify at least 10 security violations. For each violation, describe a remediation strategy. As the auditor, develop an e-mail for the director of this facility and include the violations as well as the remediation strategies along with a date for a second audit.
Email does not have to be long and drawn out just get to the points identified above and explain how to fix those issues. I have the list of violations already attached. As you will see some of these violations can be solved using the same methods.
Due 04/04/16 12:00 noon ET