1. Solutions to the Snowden Security Breech
No significant framework discussed this kind of acquiring of information. ... The problem of giving military contractors crucial information is also evident. ... Personal electronic storage devices should not be allowed into certain buildings. All sharing of sensitive information should be put in a platform whereby a standing team will have the full access to monitoring all information shared during all periods of time. ... The computer system should be set in a manner that it rejects sharing of security files at a personal level. ...
- Word Count: 2523
- Approx Pages: 10