Reference no: EM131916640
Q 1 : a) What control policy is required in order to prevent unauthorized access and damage to facilities?
b) Write 2 example controls that are required for securing Offices, Rooms, and Facilities.
Q 2 : Give two examples for protecting the equipment in an organization?
Q 3: Explain in the various threats (at least 2) of emails being sent over the internet or a network, and explain the techniques (at least 2) that use to protect the messages sent over emails?
Q 4: Describe the activities involved in log management. How to select the appropriate data to log?
There is an attach file has a book which has a key answers of previous questions in chapter 7 to chapter 9 .
Answers must be not copy and paste from the book or any other resources .
100% free of plagiarism .
Textbook : Security Program and Policies ,Principles and Practices[Second Edition] By Sari Stern Greene