CYB_100_2-3
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
100
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by DrTree1894
CYB 200 Module Two Case Study Template
Control Recommendations
Least
Privilege
Layering
(Defense in
Depth)
Fail-Safe
Defaults /
Fail Secure
Modularity
Usability
Security
Objective
Alignment
(CIA)
Explain your
Choices (1-2
sentences)
Automatically lock workstation
sessions after a standard period of
inactivity.
(Completed as an
example)
X
C
I chose
layering
because it adds
another layer
of protection
for the
confidentiality
of our data.
If possible, close and lock your
office door when leaving your
computer.
X
C
Adds a
physical layer
of security
preventing
access to the
devices that
contain
sensitive
information.
Use technology to make sure that
only authorized software executes,
and unauthorized software is
blocked from executing on assets.
X
X
I
Default to no
access and
allows access
only to
authorized
software.
Use automated tools to inventory
all administrative accounts to
ensure that only authorized
individuals have elevated
privileges.
X
I
Prevents
unauthorized
data access by
ensuring only
authorized
Control Recommendations
Least
Privilege
Layering
(Defense in
Depth)
Fail-Safe
Defaults /
Fail Secure
Modularity
Usability
Security
Objective
Alignment
(CIA)
Explain your
Choices (1-2
sentences)
individuals are
giving
elevated
privileges and
there is a log
of who those
individuals
are.
Use system configuration
management tools to automatically
reapply configuration settings to
systems at regularly scheduled
intervals.
X
I
Prevents
unauthorized
users from
using
reconfigured
settings to
access the
system.
Maintain an inventory of all
sensitive information stored or
transmitted by the organization's
technology systems, including
those located on site or at a remote
location.
X
X
A
If one section
of data is
stolen it can be
isolated to find
how it was
accessed and
prevent access
to remaining
data at other
sites.
Use approved whole-disk
encryption software to encrypt the
hard drive of all mobile devices.
X
X
C
Adds a layer
of data
protection that
still allows
Control Recommendations
Least
Privilege
Layering
(Defense in
Depth)
Fail-Safe
Defaults /
Fail Secure
Modularity
Usability
Security
Objective
Alignment
(CIA)
Explain your
Choices (1-2
sentences)
access by
authorized
sources.
If USB storage devices are
required, software should be used
that can configure systems to allow
the use of specific devices.
X
X
C
Defaults to no
access for
USB storage
but software
allows for
USB to be
allowed if and
when
appropriate.
Configure systems not to write data
to external removable media, if
there is no business need for
supporting such devices.
X
X
C
Same as USB
devices
Defaults to no
access for
external
storage but
software
allows for
external
storage to be
allowed if and
when
appropriate.
If USB storage devices are
required, all data stored on such
devices must be encrypted.
X
X
C
USB storage
devices can be
easily stolen.
Encryption is
an extra layer
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help