At Westonci.ca, we connect you with experts who provide detailed answers to your most pressing questions. Start exploring now! Discover solutions to your questions from experienced professionals across multiple fields on our comprehensive Q&A platform. Join our Q&A platform to connect with experts dedicated to providing accurate answers to your questions in various fields.

Given the following scenario, discuss in depth the risk assessment strategies and components that you would deploy in order to ensure that secure defenses and compliance attributes are embedded into the core of your network and information security deployment. Marketing company X has a need to keep their proprietary methods of marketing strategies safe from other companies who may use their information to gain a competitive advantage. The company is choosing cloud storage as their safe haven for information, and has decided not to store any of their data locally. For speed purposes, the company has also chosen to not use two-factor authentication and has chosen basic password security authentication instead, allowing those with a need to know to access the information using a simple password. This was mandated by the CFO of the company in order to make things easy for the staff, who know very little about computer security, and complain about things taking too many steps to access. Discuss and describe how you would handle this situation, and perhaps make note of any recommended changes you would make as you deploy your risk assessment strategy to help the CTO understand the consequences and/or rewards for the decisions made thus far.

Sagot :

Answer:

I can't make out the question

Thank you for your visit. We are dedicated to helping you find the information you need, whenever you need it. Thanks for stopping by. We strive to provide the best answers for all your questions. See you again soon. Get the answers you need at Westonci.ca. Stay informed with our latest expert advice.