{"id":408,"date":"2024-04-20T04:52:11","date_gmt":"2024-04-20T04:52:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/?p=408"},"modified":"2024-04-20T04:52:11","modified_gmt":"2024-04-20T04:52:11","slug":"short-research-paper-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/2024\/04\/20\/short-research-paper-2\/","title":{"rendered":"Short Research Paper #2"},"content":{"rendered":"\n<p>You have been asked to design a security policy for a corporate information system consisting of on-premises web, application, and database servers. The database servers store very sensitive data that must be protected. Discuss five important issues that should be addressed in the security policy. Perform research on information system security policies<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-content\/uploads\/sites\/30166\/2024\/04\/annotated-short20research20paper20232.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-short20research20paper20232.docx.\"><\/object><a id=\"wp-block-file--media-90a47835-08ff-4e59-9194-a752de54f093\" href=\"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-content\/uploads\/sites\/30166\/2024\/04\/annotated-short20research20paper20232.docx.pdf\">annotated-short20research20paper20232.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-content\/uploads\/sites\/30166\/2024\/04\/annotated-short20research20paper20232.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-90a47835-08ff-4e59-9194-a752de54f093\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>You have been asked to design a security policy for a corporate information system consisting of on-premises web, application, and database servers. The database servers store very sensitive data that must be protected. Discuss five important issues that should be addressed in the security policy. Perform research on information system security policies<\/p>\n","protected":false},"author":24668,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/posts\/408"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/users\/24668"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/comments?post=408"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/posts\/408\/revisions"}],"predecessor-version":[{"id":410,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/posts\/408\/revisions\/410"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/media?parent=408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/categories?post=408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/tags?post=408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}