Discussion Question 2
I need to have 2 – 3 paragraphs for each questions listed below:
1. Do you think that criteria should be developed for the decision of buying audit and control of packages and services? Why or why not? Among the different factors for feasibility success, which do you consider to be the most important and why?
2. How is the auditing of application system carried out? What are the four (4) most important specific functions of configuration management and why are they important?
3. Do you think that there is a need for classifying individual parts of a network? What is its importance in real-based applications? How can information asset security be enhanced by control techniques?
4. How are the exposure and issues of logical access control explored with the help of access control software?
1 hour ago