answersLogoWhite

0


Best Answer

Usually when this scenario occurs the users are so tightly controlled that it is very difficult for them to get anything done. As a result, frustrated users (who are blocked from doing their job, etc.) will not get useful work done.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What can occur if a security policy is so rigidly formulated that too little trust is placed in network users?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What has the author Joe Harris written?

Joe Harris has written: 'Cisco network security little black book' -- subject(s): Computer networks, Security measures


Who can play the role of the trusted third party in security network?

Any third party that both communicating parties are willing to trust. The question is a little vague.


What is the Importance of network security in business?

Corporate network security is important for businesses of any size to ensure confidential data remains secure and private. Without proper security, business networks are vulnerable to cyber-attacks that can lead to serious damage in terms of lost data, reputational harm, and financial losses. By investing in a robust corporate network security system you can protect your business from the risks posed by cybercriminals.


What operating system would you you use if you want to share resource but no concern for local security?

You don't mention what you mean by "local security". In general, this is not a question about an Operating System, but a security model. For example, a peer-to-peer network has little regard for security and does allow for local resource sharing. Peer-to-peer networks can be implemented in most operating systems; it is just a matter of configuration.


How Strong will Are Nation Security be 10yrs later on 9 11 11?

Our nation security will be a little lazier and a little over protective.


Tu es je une petit frére?

Literaly You are I a little brother. The sentence as it is formulated in the question does not make sense.


Is mad on Cartoon Network funny?

omg yes but cartoon network IS NOT for 5 year olds anymore its grown up with its audience so its funny but not for little little kids.


What are the advantages of analyzing a fault by sequence network?

little advantage


What are the release dates for Sanford and Son - 1972 A Little Extra Security - 4.13?

Sanford and Son - 1972 A Little Extra Security - 4.13 was released on: USA: 13 December 1974


What do you do if you forgot your wireless network key?

You need to log on your router go to security settings for wireless network and change the key. Because of security concerns the key is shown as asterisks (little stars) only. So basically you cannot recover it. The easiest way just to enter a new key. Also look on the bottom of your router, some routers have the wep key labeled on the bottom, if you changed the key from the default, reset your router and it should reset to the default key.


Where can I buy a USB security lock online?

http://www.slashgear.com/usb-security-lock-a-little-hardware-security-for-your-pc-047772/ is a good site to start with to find a USB security lock online.


Which of the following is a major security concern for mobile devices?

Device and data theftAnswer Explanation: Compared to other network equipment, a major security liability of mobile devices is theft or loss of the device and of its data. To minimize the impact of a lost or stolen device, you should transfer its data to a network location often. You should also implement secure passwords on the device, which will make unauthorized access a little more difficult. Another recommendation for mobile devices is to encrypt the information stored on a mobile device.