What are the layers of information security?

What will be an ideal response?


The goal of information security is to protect the integrity, confidentiality, and availability of data on the devices that store, manipulate, and transmit the information. This is achieved through a combination of three entities in three successive layers. The innermost layer consists of the products that provide the necessary security. These products, which may include intrusion-detection systems or traffic filtering devices, form the physical security around the data. The next layer is people, because without people implementing and properly using the security products, the data can never be protected. The final layer consists of procedures, which include the plans and policies established by an organization to ensure that people correctly use the products. These three layers interact with each other: the procedures tell the people how to use the products to protect the information.

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a set of formatting characteristics that you can apply to selected text

Fill in the blank(s) with correct word

Computer Science & Information Technology

A ________ is a card with a magnetic strip or chip that identifies the person assigned to the card

a. Key fob b. Badge c. Biometric scanner d. None of the above

Computer Science & Information Technology

The APs can be positioned so that the cells overlap to facilitate movement between cells, known as ____.

A. SSID broadcast B. handoff C. roaming D. scanning

Computer Science & Information Technology

What does a compile do?

What will be an ideal response?

Computer Science & Information Technology