Describe the defense in depth (DiD) strategy, and outline each of the three modes of protection.?
What will be an ideal response?
The defense in depth (DiD) strategy, developed by the National Security Agency, has three modes of protection:People: An organization must hire well-qualified people and treat them well, and should also make sure that employees are trained adequately in security procedures and are familiar with the organization's security policy. Physical and personnel security measures are included in this mode of protectionTechnology: This includes choosing a strong network architecture and using tested tools?, such as intrusion detection systems (IDSs) and firewalls. This can include regular penetration testing and risk assessment. Finally, systems that allow quick and thorough analysis when a security breach occurs should be part of this mode.Operations: This mode addresses day to-day operations, such as updating security patches, antivirus software, and OSs. Assessment and monitoring procedures and disaster recovery plans are also covered under this mode.
You might also like to view...
By default, the data type for the primary key is _____.
A. Number B. AutoNumeric C. AutoNumber D. UniqueNumber
The process of ________ checks to see if the document addresses its purpose and the required supporting information is included
A) proofreading B) researching C) analyzing D) revising
By default, the Developer tab is ________
Fill in the blank(s) with correct word
Why is the PDF file format good for saving documentation?
What will be an ideal response?