Essay Questions Answer all questions below in a single do.docx - Essay Questions Answer all questions below in a single document preferably below the

Essay Questions Answer all questions below in a single do.docx

This preview shows page 1 - 7 out of 21 pages.

Image of page 1
Essay Questions Answer all questions below in a single document, preferably below the corresponding topic. Responses should be no longer than half a page. One 1. A security program should address issues from a strategic, tactical, and operational view. The security program should be integrated at every level of the enterprise’s architecture. List a security program in each level and provide a list of security activities or controls applied in these
Image of page 2
levels. Support your list with real-world application data. 2. The objectives of security are to provide availability, integrity, and confidentiality protection to data and resources. List examples of these security states where an asset could lose these security states when attacked, compromised, or became vulnerable. Your examples could include fictitious assets that have undergone some changes. 3. Risk assessment can be completed in a qualitative or quantitative manner. Explain each risk assessment methodology and provide an example of each. Two
Image of page 3
1. Access controls are security features that are usually considered the first line of defense in asset protection. They are used to dictate how subjects access objects, and their main goal is to protect the objects from unauthorized access. These controls can be administrative, physical, or technical in nature and should be applied in a layered approach, ensuring that an intruder would have to compromise more than one countermeasure to access critical assets. Explain each of these controls of administrative, physical, and technical with examples of real-world applications. 2. Access control defines how users should be identified,
Image of page 4
authenticated, and authorized. These issues are carried out differently in different access control models and technologies, and it is up to the organization to determine which best fits its business and security needs. Explain each of these access control models with examples of real-world applications. 3. The architecture of a computer system is very important and comprises many topics. The system has to ensure that memory is properly segregated and protected, ensure that only authorized subjects access objects, ensure that untrusted processes cannot perform activities that would put other processes at risk, control the flow of
Image of page 5
information, and define a domain of resources for each subject. It also must ensure that if the computer experiences any type of disruption, it will not result in an insecure state. Many of these issues are dealt with in the system’s security policy, and the security model is built to support the requirements of this policy. Given these definitions, provide an example where
Image of page 6
Image of page 7

You've reached the end of your free preview.

Want to read all 21 pages?

  • Fall '16
  • Christopher L. Litten, MA, Ph.D.

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors