A layered security solution protects information and IT assets at every layer of the infrastructure, from the network pe
Posted: Sun Jul 10, 2022 11:29 am
Concepts of Information Systems Security: Activity You learned that ISS is about securing all types of information. Now, try categorizing the types of information based on who it belongs to. Drag each type of information from the box at the bottom to the appropriate box at the top. When you are done, click the SUBMIT button. Personal Data and Information Diplomatic information Credit card numbers Intellectual Property Patents and copyrights Bank account numbers National Security Customer databases Military intelligence n.
Process of Protecting the C-I-A Triad: Activity You have learned about the actions required to protect the C-I-A triad. Now, try classifying the given standards and policies according to the elements of the C-I-A triad they protect. Drag each action from the box at the bottom to the appropriate box at the top. When you are done, click the SUBMIT button. Personal Data and Information Vulnerability assessment policy Data classification standard Intellectual Property Enhanced access control Security awareness policy National Security Data backup policy Threat assessment policy