BuyFind

Principles of Information Security...

6th Edition
Michael E. Whitman + 1 other
Publisher: Cengage Learning
ISBN: 9781337102063
BuyFind

Principles of Information Security...

6th Edition
Michael E. Whitman + 1 other
Publisher: Cengage Learning
ISBN: 9781337102063

Solutions

Chapter
Section
Chapter 9, Problem 19RQ
Textbook Problem
855 views

List and describe the three fundamental ways that data can be intercepted. How does a physical security program protect against each of these data interception methods?

Expert Solution

Explanation of Solution

Physical security:

Physical security is giving protection to physical items or objects or even areas from an unauthorized access. That is, it gives protection physically to people, system, hardware and some resources that are connected with the management.

Data interception:

Data interception is considered as a part of physical security, because it addresses design, execution and maintenance. It is one of the serious problems among computer systems.

Fundamental ways that information could be intercepted:

  • Direct observation:
    • Direct observation requires individuals to have sufficient space in order to breach confidentiality.
    • If an employee does his work or opens the documents in home or other commercial places, the chances of observation increases.
  • Interception of data transmission:
    • During the transmission of information, interception could occur via sniffers and tapping into a LAN (Local Area Network)...

Want to see this answer and more?

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

See solution

Chapter 9 Solutions

Principles of Information Security (MindTap Course List)
Show all chapter solutions

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions
How would you model Question 6 with an OODM? (Use Figure 2.4 as your guide.)

Database Systems: Design, Implementation, & Management

What is metadata?

Database Systems: Design, Implementation, & Management

What does TPI stand for in relation to tapers?

Precision Machining Technology (MindTap Course List)

How do you input elements of a matrix in MATLAB?

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

What is contained in an RFID tag?

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

Name metal cutting machines used in the welding shop and their advantages.

Welding: Principles and Applications (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)