- Survey and evaluate a few websites that meet the aforementioned criteria. Select two websites, and provide your impression of the practices that the two websites utilize for physically securing their computer equipment.
- Discuss the vulnerabilities you see in the practices of the two websites you chose.
- Use the information they provide to devise your own set of best practices for securing essential computing equipment.
- Explain how your best practices would work and why you recommend them.
Adhere to APA Style when constructing this assignment, including in-text citations and references for all sources that are used. Please note that no abstract is needed, though you want to be sure to include an introduction and conclusion.
Review the How to Research Information Systems and Cyber Security Topics video tutorial provides strategies for researching IT and cybersecurity documents in the CSU Online Library.
This Sample Formal Essay provided by the CSU Writing Center, shows this type of formatting.
Your response must be at least four pages in length and be double-spaced. Use two sources—the course textbook and a resource from the CSU Online Library. They must be referenced; paraphrased and quoted material must have accompanying APA citations.