Information systems security?
For the scenarios that follow,identify the data that would need to be protected.Recommend how you would implement one or more of the following controls for the given scenario and justify your recommendation.
1.Administrative controls
2.Logical and technical controls
3.Hardware controls
4.Software controls
5.Physical controls.
Scenarios.....
(1) Confidential services inc.is a military support branch consisting of 14.000.000 computers with internet access and 250.000 servers.All employees must have security clearances.and they communicate using Blacberry devices and e-mail.
(2) Backordered parts is a defense contractor that builds communication parts for the military.All employees communicate using smartphones and e-mail