Tuesday, June 11, 2019

INFA questions Assignment Example | Topics and Well Written Essays - 500 words

INFA questions - Assignment ExampleIt does not dictate how many or which tool to use in improving the security of system. Rather, the choice on what number of layers and technologies to use depends upon the risk analysis done by the organization (Cisco). bear on with the way authority is assigned and organized (Northcutt). Entails formulating security policies, guidelines and planning in order to reduce loss (Stallings & Brown). Basically involves setting what employees may do, must eer do, or cannot do. Examples include changing of policies, installing motion detectors, security awareness training among others.Involves enforcing the implementation of security policies, standards and also maintaining consistency in operations together with executing corrective measures in case of deficiencies (Stallings & Brown). The procedures are effected on both hardware and software. Examples include recovery actions like system reboot, data trade and access control to data (Slideshare).It inv olves utilizing the security capabilities of the hardware and software. The security once set up is managed entirely by the computer system. Examples include setting up firewalls and access tokens, password encryptions.2. Most security models categorize controls into three types management, operational, and technical. Describe each of these categories, and provide two examples of controls that would fall within each category. (1/2 page)A characteristic of a technology that someone can take advantage of to orchestrate a security incident (Stallings & Brown). Example is when a program circumstantially allows ordinary users to execute commands that can only be executed by privileged users.A potential for violation of a security policy that comes into crop when there is an event or circumstance that could trigger breaching of security and therefore cause harm. It can be explained as a possible danger that could reply in someone taking advantage of a

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.