Revisit Alice’s security policy development in Section 2.6. Assume that Alice’s laptop is used for highly sensitive intelligence work instead of class work and personal activities.
a. Create an appropriate list of risks for that situation.
b. Create a new policy that addresses those risks, instead of the one shown in Table 2.3.
TABLE 2.3
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here