Discussion
Objective: The objective of this discussion is to view how organizations define and secure computing environment. Most times organizations set rules and monitor those rules to ascertains controls within the windows' environment.
a. How do you determine that an event had occurred in your organization?
b. What type of security policies that are in place in your organization, and what steps could be taken to stop security Violations?
c. What type of disciplinary actions that could be taken if any employee violates the security policy of their organization?
The response should include a reference list. One-inch margins, Using Times New Roman 12 pnt font, double-space and APA style of writing and citations.