1. How do you reconcile the need to treat much of the information in the plan as company confidential information, yet at the same time ensure that the plan is readily available when an attack occurs?
2. How do you garner top-level executive commitment to ensure the participation of all levels of managers and to gain support in encouraging all members of the organization to take ownership of the task of protecting information?
3. What are some of available software intrusion detection systems, what do they offer, how useful and should all companies acquire one?
This material may consist of step-by-step explanations on how to solve a problem or examples of proper writing, including the use of citations, references, bibliographies, and formatting. This material is made available for the sole purpose of studying and learning - misuse is strictly forbidden.1. As is almost always the case with confidential institutional/corporate information, there are different levels of confidentiality, depending on the information and on the context at hand. So, for example, there may be a level of confidentiality surrounding proprietary information which in fact all associates at the company access, with adherence to confidentiality codified in employment contracts; then there are other sorts of proprietary information to which access is highly restricted...