Once this occurs, you would then connect all of the different security protocols together. The basic idea is to be able to use them, to serve as a backup system in the event that there is some kind of breach. This will give the hackers limited access to: certain areas and it will isolate them to select parts of the company's servers. (Lacey, 2009, pp. 269 -- 310) The final part of the strategy is to ensure effective monitoring of the various systems. This will take place with the company using an outside security consultant. They will have the responsibility of helping to coordinate mock attacks. This will effectively test the strategy and identify for weaknesses. At the same time, they must train employees what to look out for and the possible warning signs of an early attack. This can be accomplished by: having different training modules coordinate with the security consultant. They will help to provide an initial foundation of knowledge....
At which point, they can work with employees to adjust to the changing nature of the threat. (Lacey, 2009, pp. 269 -- 310)Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now