Site icon Tutor Bin

Miami Dade College Security Perimeter Discussion

Miami Dade College Security Perimeter Discussion

Description

The first step in conducting an audit  is to create a master list of the assets your company has, in order to later decide upon what needs to be protected through the audit. While it is easy to list your tangible assets, things like computers, servers, and files, it becomes more difficult to list intangible assets. To ensure consistency in deciding which intangible company assets are included, it is helpful to draw a “security perimeter” for your audit. Briefly define the term “security perimeter” and provide a list of assets you think would fall under your university’s security perimeter.

 

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Exit mobile version