Discussion: Information Assurance
a) Describe three authentication types and give an example of each.
b) Describe some ways that an organization can recover it's IT resources from a disaster. What controls should have been in place in order to be able to retrieve this data?
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.