Principles of Information Security
Principles of Information Security
5th Edition
ISBN: 9781285448367
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Course Technology
Question
Book Icon
Chapter 12, Problem 16RQ
Program Plan Intro

Internal monitoring:

It keeps an informed alertness of the state of all of the companies’ networks.

Blurred answer
Students have asked these similar questions
Please provide an example of when one of the four different methods of access control may be used. What makes this choice unique in comparison to others that are available in the same category?
The security design should minimize the functions shared by different user which reflect     Complete mediation     Separation of privilege     Least common mechanism     Isolation
Match the description with the access control method. Based on access being determined by the owner of resource 1. Discretionary Based on access being determined by an authority 2. Mandatory 3. Role-based Based on access being determined by the role of the authority
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Text book image
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,