Information security uses administrative, technical (logical), and physical controls to mitigate risks related to organization’s assets. A policy is an administrative control.

 
nformation security uses administrative, technical (logical), and physical controls to mitigate risks related to organization’s assets.  A policy is an administrative control
If no policy exist in the IT department, research shows that employees will default to a defacto policy.  A defacto policy means a policy that is in effect ,but not formally recognize.  To stop this for happening, It is important for students to understand how to take the cloud best practices discussed throughout this course and use them to create a cloud security policyCloud security fundamentals and mechanisms is a huge part of the cloud security policy.  
For this assignment, read the attached article: “Our Journey to the Cloud”.  Use the SANS email policy template
  to create a policy for the cloud.  Please note, the SANS policy is a template you can use to structure your policy.  If you are having trouble with the links above, these supporting documents can be found in the Cloud Policy Assignment Documents folder. 

 
When moving to the cloud, in the realworld, someone may ask you, what is virtualization?  
For this assignment, create a PowerPoint presentation about virtualization.   At a minimum, discuss what is virtualization and virtualization security.  Make sure you cite five scholarly articles

Don't use plagiarized sources. Get Your Custom Essay on
Information security uses administrative, technical (logical), and physical controls to mitigate risks related to organization’s assets. A policy is an administrative control.
Just from $13/Page
Order Essay
Calculator

Calculate the price of your paper

Total price:$26
Our features

We've got everything to become your favourite writing service

Need a better grade?
We've got you covered.

Order your paper

STAY HOME, SAVE LIVES. Order your paper today and save 15% with the discount code FLIX