Problem
You are assigned to protect sensitive information on corporate finances for a drug manufacturing company. The V.P. for Finance insists on taking home sensitive financial documents on his laptop.
Respond on the following:
a) Based upon principles acquired in the course describe three methods that you would deploy to protect the sensitive files when off-premises from the corporate headquarters. Be detailed and specific in describing the methods, and then cite where in the learning resources you find support for your recommendations.
b) Then describe in reasonable detail two methods an attacker could use to compromise the sensitive files when off-site. Be specific and detailed in your answer, and then cite where the learning materials support your evaluation.