What kind of behavioral analysis would work to secure

Assignment Help Computer Engineering
Reference no: EM133459652

Question: The quarantines forced by the COVID-19 Virus have forced many companies and organizations their employees to work from home (WFH). Even though many companies and organizations have gone back to in-person work or instruction, working from home is not going to go away, at least on a partial basis.

Some advocate for surveillance of WFH employees, such as counting keystrokes, as a means of ensuring productivity and security in the WFH environment. Is that really a solution? Why or why not? Please keep in mind that Malware (Chapter 5) is a very serious problem when working from home. Think through the role of policies, procedures, and standards in terms of securing the WFH environment.

What policies, procedures, and standards do you think would be successful, and why? Consider technical matters and non-technical matters. What kind of behavioral analysis would work to secure the WFH environment, and why?

 

Reference no: EM133459652

Questions Cloud

Discuss the relationship between domestic violence : Discuss the relationship between domestic violence, codependency, and family dysfunction. Provide an example or scenario to clarify your response.
What mechanisms are used to sustain the oppression : What mechanisms are used to sustain the oppression or discrimination for illegal immigrants in America
What would happen to build the solution for the chain of bbq : what would happen to build the solution for the chain of BBQ restaurants. What development methodology for the online solution would be used?
What are the biggest unaddressed issues you notice : Homelessness can be a result of a myriad of bigger issues. Look around your communities, what are the biggest unaddressed issues you notice
What kind of behavioral analysis would work to secure : What policies, procedures, and standards do you think would be successful, and why? Consider technical matters and non-technical matters.
What do you think is the single most important policy : What do you think is the single most important policy or action that our government should take to help America's families? Explain your answer.
What factors do you think may have influenced : What factors do you think may have influenced you to go along? Do you wish you had chosen differently?.
What hybrid connectivity feature do you need to implement : What hybrid connectivity feature do you need to implement to get full coexistence? a. Minimal Hybrid Configuration b. Exchange Classic Hybrid
Do you think the recognition of the mark signifies : Do you think the recognition of the mark signifies the beginning of a sense of self?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a database to manage multiple hotels

Writing business rules to eventually create a database to manage multiple Hotels.

  Discuss in detail the role that an ids or ips would play

Discuss in detail the role that an IDS / IPS would play in the IR efforts, and explain how these systems can assist in the event notification.

  Develop plans for alternate site relocation

Develop a business continuity plan for your organization. Describe the basic activities that must be managed by the BCP. Develop plans for alternate site.

  Calculate the coefficients of the least-squares line

Suppose you have a data file example.dat with two columns that contain bivariate data. Let's call these two variables X and Y.

  Determine how many of each item should be ordered

Imagine that you are a merchant and need to keep better tabs on your merchandise to know when to reorder supplies.

  Write a bash script called checknumargs

Write a bash script called checknumargs.sh" which will echo to STDOUT all arguments passed to it on a single line IF THE NUMBER OF ARGUMENTS IS 3

  Discuss difference passive and active structural barriers

Research, then discuss the difference passive and active structural barriers to determine their possible advantages and disadvantages in a medium security.

  How can apply that security protocol in real life situations

What encryption standard is currently recommended by NIST and why? Explain your answer with examples. How can we apply that security protocol in real life.

  Write a class address that contains the street and city

Write a while statement that will only print out the numbers 50: 45: 40, 35, 30, 25, 20, 15, 10, and 5.

  Design a visual studio.net 2005

Add a Menu control and a Label control to the form. Populate the Menu control with data stored in the "Font" column and display your name in Label control (Barnes). Write down an event-handler that changes the font type in the Label control based o..

  For what fraction of time does the email application need

Consider the hierarchical network in Figure 5.30 and suppose that the data center needs to support email and video distribution among other applications.

  What is the result of the various tree traversals

What is the result of the various tree traversals when performed on an arithmetic expression tree? Which of the traversals are depth-first? Which are breadth

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd