SOFTWARE ENGINEERING >C<
SOFTWARE ENGINEERING >C<
null Edition
ISBN: 9781323165331
Author: SOMMERVILLE
Publisher: PEARSON C
Expert Solution & Answer
Book Icon
Chapter 13, Problem 13.5E

Explanation of Solution

Use of layered approach for asset protection:

In system architecture, protection is one of the fundamental issues and layered architecture is used to provide protection.

In layered architecture, the critical protected assets are present at lowest level in lowest level and they have layers of protection around them.

For example, in a patient record system, the critical assets that need to be protected are records of each individual patient.

An attacker has to penetrate three system layers in order to access and modify patients’ records and as protection increases layered approach improves security...

Blurred answer
Students have asked these similar questions
Explain, with the use of an illustration, why resistance to cyber assaults is such an important component of system dependability?
3. Why are the security consideration important in the planning of system behavior? Give examples to justify your position.
Produce a simple written guideline detailing and recommending how an organization can effectively ensure that everydocument that a prospective employee presents in the application process is genuine. This question is related to Knowledge of Information Security in general and Employee Information Security
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,