Question 2 Q.2.1 Q.2.2 You are given two statements (A and B) below: A. B. The risk to information assets that remains e
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am
Question 2 Q.2.1 Q.2.2 You are given two statements (A and B) below: A. B. The risk to information assets that remains e
Question 2 Q.2.1 Q.2.2 You are given two statements (A and B) below: A. B. The risk to information assets that remains even after current controls have been applied. The quantity and nature of risk that organisations are willing to accept as they evaluate the trade-off between perfect security and unlimited accessibility. Q.2.1.1 Identify a risk concept described in statements A and B. In your answer, give an example of why understanding these concepts is important for a Library department in a college. Q.2.1.2 Give an example that can fully explain the statement in A. Q.2.1.3 Give an example that can fully explain the statement in B. Ensure that the example illustrates the underlined words or phrases. The design of security architecture that meets an organisation's needs must follow best practices. (Marks: 20) Give examples of how each of the best practices of security architecture in (A -D) below can be designed to protect and secure the availability and access of a Student Record Management Database in a college. A. Spheres of security. B. Levels of control. C. Defense in depth. D. Security perimeter. NB: You do not need to define, describe, or explain A-D above. Give examples (4) (4) (4) (8)