CMIT425 UMUC Information Security and Intellectual Laws discussion

User Generated

qnfuvxv

Computer Science

CMIT425

University of Maryland University College

Description

  1. In your own words describe what is meant by “defense-in-depth” in security design. Give an example of a combination of security controls that you have seen implemented that show how the combination of security factors improve the overall security.
  2. The CIA triad is a common way of describing how confidentiality, integrity and availability concerns form the pillars of information security. Give an example from your experience or a technical article you’ve read that describes methods of improving security of information in each area of the CIA triad.
  3. Explain the differences between Patents, Copyrights, and Trademarks in terms of idea, expression, and symbol.
  4. Describe intellectual property laws. What clauses should a termination policy contain to prevent disclosure of an organization’s information?

Unformatted Attachment Preview

1. In your own words describe what is meant by “defense-in-depth” in security design. Give an example of a combination of security controls that you have seen implemented that show how the combination of security factors improve the overall security. 2. The CIA triad is a common way of describing how confidentiality, integrity and availability concerns form the pillars of information security. Give an example from your experience or a technical article you’ve read that describes methods of improving security of information in each area of the CIA triad. 3. Explain the differences between Patents, Copyrights, and Trademarks in terms of idea, expression, and symbol. 4. Describe intellectual property laws. What clauses should a termination policy contain to prevent disclosure of an organization’s information?
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

hello, check the solutionThank you for your time

Discussion on Information Security and Intellectual Laws
Student’s Name
Course Title
March 23, 2019

Defense-in-depth” in security design and Security Controls
In cybersecurity, Defense-in-depth is a term which is used to denote a combination of the
various defensive mechanism when it comes to protection of organization information and data
resources. In specific the term means a series of layered security mechanism which are put in
place to ensure, all the information systems and data are protected. This utilizes the mechanism
that if one controls fail there are others which would take control and thus securing the
information and data.
Combinations of security controls are used to make sure that the defense-in-depth
approach works, this includes the use of technical controls such as the use of antivirus to
ensure that the whole organization information is secured. The use of Network security...


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags