The first step in conducting an audit is to create a master list of the assets your company has, in order to later decide upon what needs to be protected through the audit. While it is easy to list your tangible assets, things like computers, servers, and files, it becomes more difficult to list intangible assets. To ensure consistency in deciding which intangible company assets are included, it is helpful to draw a “security perimeter” for your audit. Briefly define the term �security perimeter� and provide a list of assets you think would fall under your university’s security perimeter.
Assignments must be in Microsoft Word has to be at least one (1) page long.
Be careful with plagiarism.
Remember to cite resources.
Need a similar paper? Click ORDER NOW and claim a special bonus- Up to 15% Discounts Offer!!!
Latest completed orders:
|#||Title||Academic Level||Subject Area||# of Pages||Paper Urgency|