How is confidential information use or save by organizations


Assignment

Topic is The increases number in hacking and potential counter-measures.

So far The progress is good but there is a lot of room for improvement and expansion. The literature review section is a small section followed by a new section called "Trends of increase and growth in hacking". I think it is better to make literature review a major section which includes the rest following sections as subsections.

- Make sure your conclusion section be expanded.
More so, You should discuss all deliverable items proposed in your case study proposal and explain the findings

According to the proposal,below is the deliverable items

Research deliverables are

- Understanding computer vulnerabilities
- Computer vulnerability and user negligence
- Saving of confidential information in a computer system
- Protecting a computer network from possible threat

Research questions are follows

What are computer vulnerabilities and how are they exploited?

1. Why computer vulnerabilities can be associated with negligence of the users?
2. How is confidential information used or saved by organizations?

3. What measures are taken by organization to safeguard their respective computer system from being vulnerable? etc, more can be added.

The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: How is confidential information use or save by organizations
Reference No:- TGS02981106

Expected delivery within 24 Hours