Reference no: EM132257353
Step 1
Research security plans.
Using course materials and the Internet, research various security plans. Use the following to guide your research:
How do the security plans differ? In what ways are they alike?
How can these plans be used to ensure the security of sensitive information?
Step 2
Post your responses to the discussion board.
Respond to the following and, if appropriate, include personal experience as part of your answers:
What affects can an organization endure when a security breach is successful?
What benefits can an organization obtain when a breach is succesfully contained or prevented?
How does a successful breach affect the company outside of the IT portion of the organization?
Whose responsibility is it in the organization to develop, implement, and oversee the security plan?
What training can an organization give to its employees to help the organization's IT Security?