What are the layers of information security?
What will be an ideal response?
The goal of information security is to protect the integrity, confidentiality, and availability of data on the devices that store, manipulate, and transmit the information. This is achieved through a combination of three entities in three successive layers. The innermost layer consists of the products that provide the necessary security. These products, which may include intrusion-detection systems or traffic filtering devices, form the physical security around the data. The next layer is people, because without people implementing and properly using the security products, the data can never be protected. The final layer consists of procedures, which include the plans and policies established by an organization to ensure that people correctly use the products. These three layers interact with each other: the procedures tell the people how to use the products to protect the information.
You might also like to view...
Devices on a LAN are connected by using ________
Fill in the blank(s) with correct word
A user notices that when plugging a company-assigned laptop into a network port it is able to get an IP address via DHCP. However, when plugging a personal laptop into the same port, it does not get a valid IP address. Which of the following is the MOST likely cause of this?
A. The company is using 802.1X port security. B. The personal laptop is using an unsupported operating system. C. The network cable is only Cat 5e. D. Port 53 is closed on the personal laptop.
When navigating a subform, pressing ________ will move the cursor to the last field of the last record of the subform
Fill in the blank(s) with correct word
You can see through ____ areas of a layer to the layers below.
a. transparent b. opaque c. vector d. raster