Sunday, September 8, 2019
INFA questions Assignment Example | Topics and Well Written Essays - 500 words
INFA questions - Assignment Example It does not dictate how many or which tool to use in improving the security of system. Rather, the choice on what number of layers and technologies to use depends upon the risk analysis done by the organization (Cisco). Concerned with the way authority is assigned and organized (Northcutt). Entails formulating security policies, guidelines and planning in order to reduce loss (Stallings & Brown). Basically involves setting what employees may do, must always do, or cannot do. Examples include changing of policies, installing motion detectors, security awareness training among others. Involves enforcing the implementation of security policies, standards and also maintaining consistency in operations together with executing corrective measures in case of deficiencies (Stallings & Brown). The procedures are effected on both hardware and software. Examples include recovery actions like system reboot, data backup and access control to data (Slideshare). It involves utilizing the security capabilities of the hardware and software. The security once set up is managed entirely by the computer system. Examples include setting up firewalls and access tokens, password encryptions. 2. Most security models categorize controls into three types: management, operational, and technical. Describe each of these categories, and provide two examples of controls that would fall within each category. (1/2 page) A characteristic of a technology that someone can take advantage of to orchestrate a security incident (Stallings & Brown). Example is when a program unintentionally allows ordinary users to execute commands that can only be executed by privileged users. A potential for violation of a security policy that comes into play when there is an event or circumstance that could trigger breaching of security and therefore cause harm. It can be explained as a possible danger that could result in someone taking advantage of a
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.