Introduction to Information Security

User Generated

anffre707

Computer Science

Description


1-Explain how to know yourself and/or to know your enemy

2-You may find using concrete examples of weighted factor analysis from an unrelated topic useful if this concept is not familiar to students. For example, what factors are considered when buying a new car? How much weight is each factor given?

3-Give an example of an operational, technical, and political feasibility analysis

4-Give examples of each of the five risk control strategies: defend, transference, mitigation, acceptance, & termination

5-Security policies are the least expensive control to execute, but the most difficult to implement properly. List the reasons shaping policy is difficult:
Also list the three types of management of security policies, according to The National Institute of Standards and Technology’s Special Publication 800-14.

6-Design of Security Architecture
List one of the sections that outline key security architectural components. To assess whether a framework and/or blueprint are on target to meet an organization’s needs you must have a working knowledge of these security architecture components.

7-What does SETA programs mean? Comment on one other students posting under this thread

8-Managers in the IT and information security communities are called on to provide strategic planning to assure the continuous availability of information systems. What are these continuity strategies?

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

i can help you,i will do it perfect and quality


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags