Management Of Information Security
6th Edition
ISBN: 9781337671545
Author: WHITMAN
Publisher: Cengage
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 2, Problem 18RQ
Explanation of Solution
Preventing someone from violating policy or committing a crime:
To control an individual from violating policy, the organization must have concrete measures to check each type of policy violation. Some of the measures based on negative enforcement are as follows:
- Strong punitive measures
- This measure will help the employees to work more cautiously and by avoiding mistakes.
- Quality control measures
- Quality control measures will help the managers to administer the work with more attention...
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
An exhaustive investigation is the first step in determining what constitutes a breach in security.
An organization's security policy may be implemented using these ten steps:
In the case of a security breach, what actions should be done by organizations?
Chapter 2 Solutions
Management Of Information Security
Ch. 2 - Prob. 1RQCh. 2 - Prob. 2RQCh. 2 - Prob. 3RQCh. 2 - Prob. 4RQCh. 2 - Prob. 5RQCh. 2 - Prob. 6RQCh. 2 - Prob. 7RQCh. 2 - Prob. 8RQCh. 2 - Prob. 9RQCh. 2 - Prob. 10RQ
Ch. 2 - Prob. 11RQCh. 2 - Prob. 12RQCh. 2 - Prob. 13RQCh. 2 - Prob. 14RQCh. 2 - Prob. 15RQCh. 2 - Prob. 16RQCh. 2 - Prob. 17RQCh. 2 - Prob. 18RQCh. 2 - Prob. 19RQCh. 2 - Prob. 20RQCh. 2 - Prob. 1ECh. 2 - Prob. 2ECh. 2 - Prob. 3ECh. 2 - Prob. 4ECh. 2 - Prob. 5ECh. 2 - Prob. 1DQCh. 2 - Prob. 2DQCh. 2 - Prob. 3DQCh. 2 - Prob. 1EDM
Knowledge Booster
Similar questions
- What types of assumptions are commonly drawn about the culprit when criminal behaviour is carried out online?arrow_forwardThe goals of a security incident response strategy should include the prevention of theft and security breaches.arrow_forwardWhat should organizations do in the event of a security breach?arrow_forward
- A security incident response plan's objectives should include preventing theft and security breaches.arrow_forwardIn case of a security breach, what measures should be performed by organizations?arrow_forwardWhat are some consequences that could happen to employees for violating the security policy?arrow_forward
- What form of security measure would be most successful in deterring deliberate assaults if there were no rules mandating workers to take breaks or split their work?arrow_forwardIn what situations would it be okay to launch a cyber assault on a specific group or organization, and what would be the grounds for doing so?arrow_forwardWhat is the best method for preventing an illegal or unethical activity?arrow_forward
- What type of security measure would be most effective in preventing intentional assaults if there were no mandates requiring employees to take vacations or divide their duties?arrow_forwardIn Cybersecurity when getting the evidence for analysis, what 2 main things should you always be concerned about?arrow_forwardWhat are some consequences that could happen to employees for not following a security policy?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,