I will be exploring the methods of securing a VoIP (Voice over Internet Protocol) system. VoIP phone systems offer many improvements to the outdated, traditional landline services that most of us have known enough to hate. By connecting directly to the Internet, as opposed to a local phone […]
The devasting attacks on 9/11 were an unfortunate wake-up call for our nation that proved how truly defenseless we were at the time. It wasn’t surprising that many thought we were protected from risks such as terrorist threats due to our country’s immense military budget and geographical location. […]
In this paper, I will define the sixth step (monitor) in the Risk Management Framework (RMF), provide information about it using multiple government documents, explain its importance, as well as outline the possible complications involved if the step is not introduced or completed in its entirety. Finally, I […]
You must be logged in to post a comment.