Lms Integrated For Mindtap Information Security, 1 Term (6 Months) Printed Access Card For Whitman/mattord's Management Of Information Security, 5th
Lms Integrated For Mindtap Information Security, 1 Term (6 Months) Printed Access Card For Whitman/mattord's Management Of Information Security, 5th
5th Edition
ISBN: 9781305949454
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 2, Problem 20RQ

Explanation of Solution

Preventing someone from violating policy or committing a crime:

To control an individual from violating policy, the organization must have concrete measures to check each type of policy violation. Some of the measures based on negative enforcement are as follows:

  • Strong punitive measures
    • This measure will help the employees to work more cautiously and by avoiding mistakes.
  • Quality control measures
    • Quality control measures will help the managers to administer the work with more attention...

Blurred answer
Students have asked these similar questions
An exhaustive investigation is the first step in determining what constitutes a breach in security.
An organization's security policy may be implemented using these ten steps:
What types of assumptions are commonly drawn about the culprit when criminal behaviour is carried out online?
Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,