Answered You can hire a professional tutor to get the answer.
Use a Microsoft Word document for Part 1 and a graphics presentation program for Part 2.Part 1: Review QuestionsWhat functions constitute a complete information security program? What is the typical
Use a Microsoft Word document for Part 1 and a graphics presentation program for Part 2.
Part 1: Review Questions
- What functions constitute a complete information security program?
- What is the typical size of the security staff in a small organization? A medium-sized organization? A large organization? A very large organization?
- Where can an organization place the information security unit? Where should (and shouldn’t) it be placed?
- Into what four areas should the information security functions be divided?
Part 2: Module Practice
Design three security posters on various aspects of information security using a graphics presentation program and clip art. Describe the methods you used to develop your design.