Security Policy

profilegsgaurangs

 

Background: According to Sharda (2015), Management needs to approach security in a way that expresses its importance and instructs users on what they need to do to achieve safety. Without sound management policy, access and storage technologies will be useless.

Reference: Sharda, R., Delen, Dursun, Turban, E., Aronson, J. E., Liang, T-P., & King, D. (2015). Business Intelligence and Analytics: Systems for Decision Support. 10th Edition. By PEARSON Education. Inc.

ISBN-13: 978-0-13-305090-5

Assignment: About the background statement above, research for commonly used management security policy areas, mention three out what you find in your research exercise and describe an example policy for each area.

Your research paper should be at least three pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

Submit your assignment on or before the due date.

    • Posted: 6 days ago
    • Due: 
    • Budget: $10
    Tags: ppt
    • Rated 1 times

      Main Assig 8

      Research: Security Policy.

      Background: According to Sharda (2015), Management needs to approach security in a way that expresses its importance and instructs users on what they need to do to …

    • Background: According to Sharda (2015), Management needs to approach security in a way that expresses its importance and instructs users on what they need to do to achieve safety. Without …