Discuss the layered implementation of security.
What will be an ideal response?
One of the basic tenets of security architectures is the layered implementation of security. This layered approach is called defense in depth. To achieve defense in depth, an organization must establish multiple layers of security controls and safeguards, which can be organized into policy, training and education, and technology per the NSTISSC model. Although policy itself may not prevent attacks, it certainly prepares the organization to handle them, and coupled with other layers, it can deter attacks. This is true of training and education, which can also provide some defense against attacks stemming from employee ignorance and social engineering. Technology is also implemented in layers, with detection equipment working in tandem with reaction technology, all operating behind access control mechanisms.
You might also like to view...
The computer or print server device offering the printer share is the ____.
A. network print server B. network print manager C. network print client D. network print provider
Acquiring Microsoft Office through Office 365, a subscription service, will allow all of the following EXCEPT
A. get the most up-to-date versions of apps B. move apps from old to new devices C. install the apps on a maximum of two devices D. ability to install on multiple devices
Defeating authentication follows the method–opportunity–motive paradigm described in Chapter 1. Discuss how these three factors apply to an attack on authentication.
What will be an ideal response?
Charlotte wants to organize data in a document into a table. To move to the next cell in the same row, Charlotte presses the ____ key.
A. Enter B. Tab C. down arrow D. up arrow