CYB 200 Module Three Case Study V
.docx
keyboard_arrow_up
School
CUNY John Jay College of Criminal Justice *
*We aren’t endorsed by this school
Course
BDHDB
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
10
Uploaded by VET0003
CYB 200 Module Three Case Study Template
Control
Recommendations
Isolatio
n
Encapsulatio
n
Complet
e
Mediatio
n
Minimize
Trust
Surface
(Reluctance
to Trust)
Trust
Relationship
s
Security
Objectiv
e
Alignme
nt (CIA)
Explain Your
Choices
(1–2 sentences)
Deploy an automated tool on network perimeters that monitors for unauthorized transfer of sensitive information and blocks such transfers while alerting X
Confident
iality
As part of the confidentiality objective, minimizing the trust
surface helps restrict access and prevent unauthorized transfers.
Control
Recommendations
Isolatio
n
Encapsulatio
n
Complet
e
Mediatio
n
Minimize
Trust
Surface
(Reluctance
to Trust)
Trust
Relationship
s
Security
Objectiv
e
Alignme
nt (CIA)
Explain Your
Choices
(1–2 sentences)
information security professionals.
Monitor all traffic leaving the organization to detect any unauthorized use.
X
Integrity
Monitor and prevent unauthorized access
to data by minimizing trust surfaces.
Use an automated tool, such as host-
based data loss prevention, to enforce X
Confident
iality
The objective of confidentiality can be achieved by reducing the trust
Control
Recommendations
Isolatio
n
Encapsulatio
n
Complet
e
Mediatio
n
Minimize
Trust
Surface
(Reluctance
to Trust)
Trust
Relationship
s
Security
Objectiv
e
Alignme
nt (CIA)
Explain Your
Choices
(1–2 sentences)
access controls to data
even when data is copied off a system.
surface, which restricts unauthorized access.
Physically or logically
segregated systems should be used to isolate higher-risk software that is required for business operations.
X
Confident
iality
Software isolation contributes to confidentiality by protecting higher-
risk software.
Control
Recommendations
Isolatio
n
Encapsulatio
n
Complet
e
Mediatio
n
Minimize
Trust
Surface
(Reluctance
to Trust)
Trust
Relationship
s
Security
Objectiv
e
Alignme
nt (CIA)
Explain Your
Choices
(1–2 sentences)
Make sure that only the resources necessary to perform daily business tasks are assigned to the end
users performing such tasks.
X
Availabili
ty
Access to only necessary resources
is maximized by minimizing the trust
surface.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help