CYB 200 Module Three Case Study V

.docx

School

CUNY John Jay College of Criminal Justice *

*We aren’t endorsed by this school

Course

BDHDB

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

10

Uploaded by VET0003

Report
CYB 200 Module Three Case Study Template Control Recommendations Isolatio n Encapsulatio n Complet e Mediatio n Minimize Trust Surface (Reluctance to Trust) Trust Relationship s Security Objectiv e Alignme nt (CIA) Explain Your Choices (1–2 sentences) Deploy an automated tool on network perimeters that monitors for unauthorized transfer of sensitive information and blocks such transfers while alerting X Confident iality As part of the confidentiality objective, minimizing the trust surface helps restrict access and prevent unauthorized transfers.
Control Recommendations Isolatio n Encapsulatio n Complet e Mediatio n Minimize Trust Surface (Reluctance to Trust) Trust Relationship s Security Objectiv e Alignme nt (CIA) Explain Your Choices (1–2 sentences) information security professionals. Monitor all traffic leaving the organization to detect any unauthorized use. X Integrity Monitor and prevent unauthorized access to data by minimizing trust surfaces. Use an automated tool, such as host- based data loss prevention, to enforce X Confident iality The objective of confidentiality can be achieved by reducing the trust
Control Recommendations Isolatio n Encapsulatio n Complet e Mediatio n Minimize Trust Surface (Reluctance to Trust) Trust Relationship s Security Objectiv e Alignme nt (CIA) Explain Your Choices (1–2 sentences) access controls to data even when data is copied off a system. surface, which restricts unauthorized access. Physically or logically segregated systems should be used to isolate higher-risk software that is required for business operations. X Confident iality Software isolation contributes to confidentiality by protecting higher- risk software.
Control Recommendations Isolatio n Encapsulatio n Complet e Mediatio n Minimize Trust Surface (Reluctance to Trust) Trust Relationship s Security Objectiv e Alignme nt (CIA) Explain Your Choices (1–2 sentences) Make sure that only the resources necessary to perform daily business tasks are assigned to the end users performing such tasks. X Availabili ty Access to only necessary resources is maximized by minimizing the trust surface.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help