Principles of Information Security
5th Edition
ISBN: 9781285448367
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Course Technology
expand_more
expand_more
format_list_bulleted
Question
Chapter 12, Problem 16RQ
Program Plan Intro
Internal monitoring:
It keeps an informed alertness of the state of all of the companies’ networks.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Please provide an example of when one of the four different methods of access control may be used. What makes this choice unique in comparison to others that are available in the same category?
The security design should minimize the functions shared by different user which reflect
Complete mediation
Separation of privilege
Least common mechanism
Isolation
Match the description with the access control method.
Based on access being
determined by the owner of
resource
1. Discretionary
Based on access being
determined by an authority
2. Mandatory
3. Role-based
Based on access being
determined by the role of
the authority
Chapter 12 Solutions
Principles of Information Security
Ch. 12 - Prob. 1RQCh. 12 - Prob. 2RQCh. 12 - Prob. 3RQCh. 12 - Prob. 4RQCh. 12 - Prob. 5RQCh. 12 - Prob. 6RQCh. 12 - Prob. 7RQCh. 12 - Prob. 8RQCh. 12 - Prob. 9RQCh. 12 - Prob. 10RQ
Ch. 12 - Prob. 11RQCh. 12 - Prob. 12RQCh. 12 - Prob. 13RQCh. 12 - Prob. 14RQCh. 12 - Prob. 15RQCh. 12 - Prob. 16RQCh. 12 - Prob. 17RQCh. 12 - Prob. 18RQCh. 12 - Prob. 19RQCh. 12 - Prob. 20RQCh. 12 - Prob. 1ECh. 12 - Prob. 2ECh. 12 - Prob. 3ECh. 12 - Prob. 5ECh. 12 - Prob. 1CEDQCh. 12 - Prob. 2CEDQCh. 12 - Prob. 1EDM
Knowledge Booster
Similar questions
- What is Access Security Software's purpose?arrow_forwardWhat factors should be taken into account while creating a user-defined identity, and how should it be carried out?arrow_forwardWhat measures are implemented in handler interfaces to detect and mitigate potential cyber-attacks or unauthorized access?arrow_forward
- A security control is a specific action or procedure provided to protect confidentiality, integrity and availability of information/systems. Explain information security control with respect to the following: (i) Administrative Controls (ii) Technical or Logical Controls (iii) Physical Controlsarrow_forwardThis Access Control Principle states that no single individual should have so many privileges that the individual is able to complete important technical or business functions on his or her own.Choose the correct answer? Separation of Duties Multi-partite Employee Controls Least Privilege Bio-metric Validationarrow_forwardOutline the parameters of application security.arrow_forward
- It is important to use a method when setting up information security. What effect does a method have on the way things are done?arrow_forwardDetermine the access control model where users are assigned access rights based on their function within the organization? a) This is a feature of Discretionary Access Control (DAC). b) This is a feature of Rule Based Access Control (RBAC). c) This is a feature of Mandatory Access Control (MAC). d) This is a feature of Role Based Access Control (RBAC).arrow_forwardWhich kind of data protection limits access to essential information for a given task?arrow_forward
- Homework 5 - Write the Security plan for the software that implements on-line auction system Guidelines: The security plan should outline the authentication and authorization, and privacy requirements for the software The known threats to the system should be described along with a plan for managing each threat.arrow_forwardExplain how programming vulnerabilities have evolved over time.arrow_forwardSecurity that operates from the top down as opposed to the bottom up: What are the advantages of acting in this manner?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningSystems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,