• Home
  • Blog
  • CISS 400 Bethesda University of California Password Protection Policy Discussion

CISS 400 Bethesda University of California Password Protection Policy Discussion

0 comments

I’m working on a operating systems question and need an explanation and answer to help me learn.

First, complete the Hands-on Projects 13-1, 13-2, 13-3, and 13-4 from your text. Next, attach the text file from 13-2 as well as text file with the date, time, and number of times the program has run from 13-4. You do not need to write any of the memos or notes outlined in the activities. I want you to get a feel for the activities you are performing for this investigation before you begin reviewing some policies that address potential legal issues.

Now, let’s set the scene:

Dan is a bit nervous about the Robinson investigation: “It’s a legal minefield.” He asks you to identify the policies that should be reviewed and understood in preparation for the case being thrown out due to legal issues, or, even worse, a lawsuit.

Browse the policies on the SANS institute website. (You may choose other sites as well based on your chapter reading.)

Identify at least three policies you believe need to be understood when conducting an investigation involving cloud storage. Give a short rationale for each policy you select.

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}