Number 3 IPP

profilejdmvin

. Provide best security practices and guidelines to implement and follow, as well as the creation of formal security policies and a security plan. Include the following policies in your IT security policy:

  • Disaster recovery
  • Password creation and protection
  • Remote access
  • Routers and switches security
  • Wireless communication
  • Server security
  • Acceptable encryption
  • E-mail

. Create and submit a 3-4 page Word document defining your recommendations concerning security. Be sure to articulate reasons for specific choices. Include in your document an explanation about the relationship between the IT security policy and the chosen security mechanisms for your overall solution. Be prepared to discuss your thoughts with the team’s Security Specialist.

    • 8 years ago
    • 25
    Answer(1)

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      number_3_ipp.docx