Page 1 of 1

A layered security solution protects information and IT assets at every layer of the infrastructure, from the network pe

Posted: Sun Jul 10, 2022 11:29 am
by answerhappygod
A Layered Security Solution Protects Information And It Assets At Every Layer Of The Infrastructure From The Network Pe 1
A Layered Security Solution Protects Information And It Assets At Every Layer Of The Infrastructure From The Network Pe 1 (58.76 KiB) Viewed 49 times
A layered security solution protects information and IT assetsat every layer of the infrastructure, from the network perimeter tothe workstation on the internal network. A layered solution thataddresses the three tenets of the CIA triad works only whenimplemented across the entire IT infrastructure. Along with layeredsolutions—for example, firewalls, intrusion detectionsystem/intrusion prevention system (IDS/IPS), and antimalwaresoftware—security policies must be enforced to support a layereddefense.Position the mouse pointer over each tenet of the CIA triad tolearn more about the steps for protecting it. Next, click theACTIVITY button to attempt a simple exercise.
A Layered Security Solution Protects Information And It Assets At Every Layer Of The Infrastructure From The Network Pe 2
A Layered Security Solution Protects Information And It Assets At Every Layer Of The Infrastructure From The Network Pe 2 (26.6 KiB) Viewed 49 times
Concepts of Information Systems Security: Activity You learned that ISS is about securing all types of information. Now, try categorizing the types of information based on who it belongs to. Drag each type of information from the box at the bottom to the appropriate box at the top. When you are done, click the SUBMIT button. Personal Data and Information Diplomatic information Credit card numbers Intellectual Property Patents and copyrights Bank account numbers National Security Customer databases Military intelligence n.
Process of Protecting the C-I-A Triad: Activity You have learned about the actions required to protect the C-I-A triad. Now, try classifying the given standards and policies according to the elements of the C-I-A triad they protect. Drag each action from the box at the bottom to the appropriate box at the top. When you are done, click the SUBMIT button. Personal Data and Information Vulnerability assessment policy Data classification standard Intellectual Property Enhanced access control Security awareness policy National Security Data backup policy Threat assessment policy