Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 5, Problem 2RQ
Explanation of Solution
Sun Tzu’s two key understandings:
According to Sun Tzu, the two key understandings to success in battle are, know yourself and to know the enemy.
Know yourself:
- First one must know their identity, examine and understand the
information and system which are currently undergoing in the organization. - Information should be analyzed and the system which stores, uses and transmit information should be checked repeatedly.
- These steps should be taken to protect it from risk and to make sure up to which vulnerabilities are they susceptible.
- Once the process has been identified, analyze what are the measures that have been already taken to protect the system.
- Moving the asset from place does not really mean that the asset is kept safer.
- Organizations will start implementing the control
mechanisms , but they unfortunately neglect the periodic review, maintenance, revision which are necessary to run the system without risk...
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Is the use of technology still necessary, and what strategies do we now employ?
What can we do as a people to prevent more internal strife and exterior disintegration?
Describe the GRANT proclamation and how it pertains to national defense. What kind of legal rights are offered for purchase? What steps must be taken to get them cancelled?
Chapter 5 Solutions
Principles of Information Security (MindTap Course List)
Ch. 5 - Prob. 1RQCh. 5 - Prob. 2RQCh. 5 - Prob. 3RQCh. 5 - Prob. 4RQCh. 5 - Prob. 5RQCh. 5 - Prob. 6RQCh. 5 - Prob. 7RQCh. 5 - Prob. 8RQCh. 5 - Prob. 9RQCh. 5 - Prob. 10RQ
Ch. 5 - Prob. 11RQCh. 5 - Prob. 12RQCh. 5 - Prob. 13RQCh. 5 - Prob. 14RQCh. 5 - Prob. 15RQCh. 5 - Prob. 16RQCh. 5 - Prob. 17RQCh. 5 - Prob. 18RQCh. 5 - Prob. 19RQCh. 5 - Prob. 20RQCh. 5 - Prob. 1ECh. 5 - Prob. 2ECh. 5 - Prob. 3ECh. 5 - Prob. 4ECh. 5 - Prob. 5ECh. 5 - Prob. 1CEDQCh. 5 - Prob. 2CEDQCh. 5 - Prob. 3CEDQCh. 5 - Prob. 1EDM
Knowledge Booster
Similar questions
- What do various modernistic worldviews think about autonomous, intelligent weapons?arrow_forward1 Question: To what extent are cryptocurrencies being used to help fund Ukraine's resistance to the Russian invasion. Do you feel that this is a valuable approach to supporting the disaster needs of Ukranians? What more could be done to support the people of Ukraine with cryptocurrencies or other related tools? Requirements 1. Each answer should be a short response of at least 500 words (more is fine). You must write in full sentences and use proper grammar, punctuation, and spelling. 2. Your response should use APA format and include at least three references (books, journal articles or even websites or acceptable)arrow_forwardWeakening society values and enabling people to take moral breaks are the consequences of technical progress.arrow_forward
- How much of an impact do you think AI will have in the future?I was wondering what sorts of AI-powered programs are already available.Does it give you the willies to think about what AI will be like in the future and how it will function?arrow_forwardHow do you see new problems arising when disruptive innovations in technology and/or the spread of disease continuing to alter our organization's fundamental workings?arrow_forwardHow can employees of a corporation ensure that their knowledge of a secret remains inside the organisation? How can you ensure that workers at your company who have previously adopted KMS will continue to learn if you insist on maintaining constant in-person instruction?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning