Documenting a network is essential in troubleshooting and support. Discuss the security implications in keeping such documentation. How should an organization balance access to the documentation against protecting the network from intentional hacking, compromise or damage?

General guidelines for all class discussions:

You are responsible to post (A)at minimum, at least three times (including your original introduction) to the Discussion area for the Introduction Discussion Forum. More posts are welcome and encouraged.
Post a thorough, grammatically sound response that pertains to the course material
You are required to respond to at least two of your classmate’s original posts. They are to be thought provoking responses. In other words, your reply needs to be more detailed than “Great job,” or “I like what you said here.” Responses are due.
It is critical that you are forthright and genuine with your opinions when it comes to participating in our class discussions. However, it is essential that you tie your opinions into the literature and substance of the topics being covered within the class for that particular week. In other words, your responses should allude to, and suggest a sort of understanding/comprehension of the material being covered in class for that period of time.
Additional requirements:

Supplement the textbook information with at least one other source.
Do not use the following sources:
Wikipedia – no wiki pages at all.
Ask.com
Yahoo Answers
Infoplease
E-How

Sample Solution

This question has been answered.

Get Answer