Discussion
Q1. “IT Security Policy Enforcement and Monitoring” Please respond to the following: · Describe how monitoring worker activities can increase the security within organizations. Describe the rationale that managers should use to determine the degree of monitoring that the organization should conduct. · Explain the extent to which you believe an organization has the right to monitor user actions and traffic. Determine the […]