Management of Information Security (MindTap Course List)
5th Edition
ISBN: 9781305501256
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 2, Problem 20RQ
Explanation of Solution
Preventing someone from violating policy or committing a crime:
To control an individual from violating policy, the organization must have concrete measures to check each type of policy violation. Some of the measures based on negative enforcement are as follows:
- Strong punitive measures
- This measure will help the employees to work more cautiously and by avoiding mistakes.
- Quality control measures
- Quality control measures will help the managers to administer the work with more attention...
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
What types of assumptions are commonly drawn about the culprit when criminal behaviour is carried out online?
An organization's security policy may be implemented using these ten steps:
An exhaustive investigation is the first step in determining what constitutes a breach in security.
Chapter 2 Solutions
Management of Information Security (MindTap Course List)
Ch. 2 - Prob. 12RQCh. 2 - Prob. 13RQCh. 2 - Prob. 14RQCh. 2 - Prob. 15RQCh. 2 - Prob. 16RQCh. 2 - Prob. 1RQCh. 2 - Prob. 2RQCh. 2 - Prob. 3RQCh. 2 - Prob. 4RQCh. 2 - Prob. 5RQ
Ch. 2 - Prob. 6RQCh. 2 - Prob. 7RQCh. 2 - Prob. 8RQCh. 2 - Prob. 9RQCh. 2 - Prob. 10RQCh. 2 - Prob. 11RQCh. 2 - Prob. 17RQCh. 2 - Prob. 18RQCh. 2 - Prob. 19RQCh. 2 - Prob. 20RQCh. 2 - Prob. 1ECh. 2 - Prob. 2ECh. 2 - Prob. 3ECh. 2 - Prob. 4ECh. 2 - Prob. 5ECh. 2 - Prob. 1DQCh. 2 - Prob. 2DQCh. 2 - Prob. 3DQCh. 2 - Prob. 1EDM
Knowledge Booster
Similar questions
- A security incident response plan's objectives should include preventing theft and security breaches.arrow_forwardIn the case of a security breach, what actions should be done by organizations?arrow_forwardThe goals of a security incident response strategy should include the prevention of theft and security breaches.arrow_forward
- What is the best method for preventing an illegal or unethical activity?arrow_forwardWhat type of security measure would be most effective in preventing intentional assaults if there were no mandates requiring employees to take vacations or divide their duties?arrow_forwardIn what situations would it be okay to launch a cyber assault on a specific group or organization, and what would be the grounds for doing so?arrow_forward
- What form of security measure would be most successful in deterring deliberate assaults if there were no rules mandating workers to take breaks or split their work?arrow_forwardIn Cybersecurity when getting the evidence for analysis, what 2 main things should you always be concerned about?arrow_forwardIf a company's security is breached, what steps should be taken?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,