Compare the concept of defense-in-depth and the principle of least privilege.

What will be an ideal response?


In connection to firewalls, the defense-in-depth concept mandates that a single firewall should not be your only defense. Deploy a sound network firewall architecture, deploy host-based firewalls, and use IPS and other security technologies to ensure that if a firewall is breached, the attacker is stopped elsewhere. The principle of least privilege mandates that users be given the minimum amount of privilege to do their jobs. With firewalls, this principle translates into starting with default firewall rules that deny all traffic and then gradually allowing more traffic as the business needs dictate.

Computer Science & Information Technology

You might also like to view...

Show that the graph convolution product satisfies the following properties:

(a) It is commutative, that is,f?g=g?f. (b) It is distributive, that is,f?(g+h) =f?g+f?h. (c) It is associative, that is,f?(g?h) = (f?g)?h. (d)L(f?g) =f?(Lg) = (Lf)?g

Computer Science & Information Technology

Which of the following represents the acceptable data loss?

A) Maximum tolerable downtime B) Maximum tolerable uptime C) Recovery time objective D) Recovery point objective

Computer Science & Information Technology

What does the .. entry in a directory point to? What does this entry point to in the root (/) directory?

What will be an ideal response?

Computer Science & Information Technology

You can create your own exceptions.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology