Information Systems Security Journal 7-INT 2840
Information Systems Security Journal 7-
- Enter the date and write how you are felling right now.
- Read Chapter 8, Information Systems Security, Chapter 12 Managing Systems Support and Security, and Read Chapter 6.2 Effective Conflict Management Strategies.
- Describe the 3 parts of the Information Security Triad.
- Name one tool for each of the 3 part of the Information Security Triad that could be used to ensure a company’s system is secure (name at least 3 total).
- List two cybersecurity tools you already implement with your personal devices. List one new/existing tool you learned about in this chapter that you plan to implement and explain why.
- Prepare a security checklist, be sure to consider all six information security levels, for the Case In Point company, Chain Link Consulting, Inc., described in the tan boxes throughout the Chapter 12 reading. The checklist should be in the form of a Word document the company can give to their clients to assess real-world vulnerabilities.
- List four preventive steps that a group and its members may take to lessen the likelihood of experiencing damaging conflict
- Identify two measures related to space and time that a group may employ to mediate against potentially destructive conflict
- Describe four steps team members can take to manage conflict when it arises during meetings.
- What does the acronym SLACK mean?
Answer Preview-Information Systems Security Journal 7-INT 2840
$5.00