IM research paper

profileVkmsbi8989

Instant messaging: 


Indentify the threats to IM use that the enterprise must defend against to keep their information assets secure.  Then, taking into account the best practices for IM use and current technologies available to monitor IM activity, identify the policies, controls, and security measures that you would put into place if you were implementing an IM program for an organization to keep information assets secure and to prevent e-document and data loss.

You must support your work with at least four credible sources.  Two of the four must be academic, peer-reviewed sources.

    • Posted: 10 days ago
    • Due: 
    • Budget: $15
    Tags: csIT
    Answers 1

    Purchase the answer to view it

    blurred-text
    • Instant messaging (IM) use in enterprises has proliferated – despite the fact that frequently proper policies, controls, and security measures are not in place to prevent e-document and data …

    • Rated 1 times

      Instant Messaging

      Instant messaging (IM) use in enterprises has proliferated – despite the fact that frequently proper policies, controls, and security measures are not in place to prevent e-document and data …