December 12, 2019
Based on the Greiner (2010) article, in addition to traditional technical security tools, some of the network security best practices are non-technical and relate tophysical security and employees. Name three of these practices and explain how your organization meets or falls short on the practices identified.