Site icon Doc Sity

University of Houston Downtown Cyber Security Discussion

University of Houston Downtown Cyber Security Discussion

Question Description

I’m working on a cyber security exercise and need a sample draft to help me learn.

All good security programs address 3 key layers of activity: security tools, documented processes, and educating users. Scenario – You are the new IT security manager of a small company with 300 users. The CIO recently announced a project of moving more data to the cloud. The legal team ahs raised concerns about not properly protecting the data because we don’t know exactly the type of data that’s in all the files marked for the move.

She wants you to provide her a write up that summarizes the steps your company needs to carry out. There are resources in the weekly content folder. As you provide the steps to the classification, be sure to explain how you plan to carry this out utilizing the 3 key areas available to you – people, processes, and tools.   

Explanation & Answer:
350 words
Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with our’s honor code & terms of service.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Exit mobile version