Evaluate the impact on auditors if operating systems and networks are determined to lack adequate security controls. Suggest at least two controls that should be implemented to reduce the risk to data integrity and explain your answer.
Create an argument in support of establishing a policy for security violations so when breaches occur, the organization will be a position to prosecute the person committing the violation. Determine the types of security controls that should be implemented to reduce security violations and explain your answer.