Explanation of Solution
Guards:
The non-living things such as fences, walls are static in nature. They cannot respond to unauthorized access. The living guards such as securities, soldiers are the one who protect the facilities and assets. Their work is to safeguard the place from fire or theft.
Guards – effective form of control:
Guards are considered as the effective form of control, because; they can predict every situation and make responses to it. Every guard has clear “standard operating procedures (SOPs)” that aid them to act assertively in unfamiliar circumstances.
Guards are expensive:
Guards act dynamically and they protect the place from theft. It requires proper recruitment of human resources...
Trending nowThis is a popular solution!
Chapter 9 Solutions
Principles of Information Security (MindTap Course List)
- What does it mean to you to be on the safe side of things? Maintaining one's safety in the real world is becoming an increasingly challenging endeavor. Is it conceivable for a single assault on the infrastructure of an organization to take on a number of diverse forms?arrow_forwardWhile society expects businesses to be prepared for disasters and to recover using their own resources, it does not appear that individuals are equipped to endure a crisis. Should we expect the government, at any level, to be in charge of catastrophe recovery, whether at the personal or commercial level? If so, why or why not? What kind of concessions would a company have to make if the catastrophe recovery process was handed over to a government agency?arrow_forwardWhat is it about paperwork that makes it so crucial to the effective conduct of a criminal investigation? Make a list of the bare minimum non-computer-specific documentation that is necessary in every given situation.arrow_forward
- Why is documentation so important in a thorough criminal investigation, and what role does it play? Determine the bare minimum of paper work outside the realm of computers that would be required for a probe.arrow_forwardAre the preventive procedures sufficient to ensure the safety of the information system? Alternatively, is everything random or is there a method to ensure anything?arrow_forwardDeveloping a threat model is a complicated process.arrow_forward
- What are the different methods a scrum team could handle a deviation including reactive and preventive methods?arrow_forwardCompare and contrast some specific types of defensive techniques that would be sufficient to deter an apprentice-level intruder to what would be needed to keep out a master-level intruder.arrow_forwardThe second step in threat modelling is to identify technologies and security measures that you are already aware of.arrow_forward
- How do you go about creating a threat model?arrow_forwardAfter reading the case presented in the module, write a short response to the following discussion questions and ethical decision making scenario. Discussion Questions Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that? How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance? Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?arrow_forwardOne of the challenges associated with computer security is that it is frequently considered an afterthought, or something that should be added into a system after it has been designed, rather than being regarded as an essential component of the design process from the very beginning. This is one of the primary reasons why computer security is so problematic. If safety is treated as an afterthought, it is vital to investigate the repercussions for just a moment.arrow_forward
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,