Information systems

List and Describe the methods firms use to ensure the integrity of their software, their hardware, their networks, and their partners? 


Your response should have 3 to 5 properly constructed paragraphs with 3 to 5 properly constructed sentences per paragraph. 

To receive full credit you must satisfy the following criteria

  1. How many methods, at least 6.
  2. Was Hardware, Software and Networks addressed?
  3. Was Wired and Wireless addressed?
  4. How about Internal and External threats?