Based on the Greiner (2010) article, in addition to traditional technical security tools, some of the network security best practices are non-technical and relate tophysical security and employees. Name three of these practices and explain how your organization meets or falls short on the practices identified.
Think about the Internet search engine you use the most often. If it is Yahoo!, what is it about Yahoo! that attracts you as a user? If it is not Yahoo!, what could Yahoo! learn from the search engine you use that could help make it better?