Describe three methods that you would deploy to protect


Problem

You are assigned to protect sensitive information on corporate finances for a drug manufacturing company. The V.P. for Finance insists on taking home sensitive financial documents on his laptop.

Respond on the following:

a) Based upon principles acquired in the course describe three methods that you would deploy to protect the sensitive files when off-premises from the corporate headquarters. Be detailed and specific in describing the methods, and then cite where in the learning resources you find support for your recommendations.

b) Then describe in reasonable detail two methods an attacker could use to compromise the sensitive files when off-site. Be specific and detailed in your answer, and then cite where the learning materials support your evaluation.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Describe three methods that you would deploy to protect
Reference No:- TGS03319438

Expected delivery within 24 Hours