Understanding IT Security Controls
Consider the risk to “integrity of the accounting records on the server” from “corruption of these files due to import of a worm/virus onto a system,” as
discussed in Problem 14.3 in your textbook. From the list shown in Table 15.3 in your textbook, select some suitable specific controls that could reduce this
risk. Indicate which you believe would be most cost effective. Support your answers.
Your well-written paper should meet the following requirements:
Paper length: 2-3 pages
Include an illustrative table, graphic, or other diagram that can be created or included from properly cited external references.
Include two external, scholarly references in addition to the textbook. Do not use blogs, wikis, or other non-scholarly sources