Problem
• One of the most significant and common threats is the insider threat. What actions do you think is appropriate for security an organization regarding the insider threat?
• Imagine you are the new CEO of a toy Research & Design Company. Your company was in the process of creating an electronic gaming toy and the final protocol plans have been developed. You are not sure what security protocols are in place. What is your approach for securing the data from an outside threat?
The response must include a reference list. Using Times New Roman 12 pnt font, double-space, one-inch margins, and APA style of writing and citations.