Discussion: User Domain Policies
It has been said that people are the weakest link in an organization's network. Do you agree that people are the weakest link in the information security chain? If yes, what types of users are there to the information security chain.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.