Discuss Observation in the Security Strategy book, provide different tactical co
ID: 3912288 • Letter: D
Question
Discuss Observation in the Security Strategy book, provide different tactical concepts that apply to information technology. Again, even though these are focused on security, each applies to IT. While you need to be familiar with all of them, for this assignment you should choose one to explain in your own words. Include an example that explains the concept. Justify why the principle is important for IT Strategy and Tactics. Find at least one additional reference for each one you choose. Rather than providing a paper, you are to create a PowerPoint presentation explaining the concept. It should contain 10-15 slides, including a title slide and a reference slide. You may include pictures, graphs, figures, or charts to help your discussion of the topic. Your final presentation product should be professional in format as if you are going to present it to upper management. Make sure to include your name, class number, and assignment number in your PowerPoint Title slide and give proper attention to formatting, spelling, grammar, and punctuation.
Explanation / Answer
Before understanding the meaning of Defense in Depth we must understand the term “Layered security” A layered security approach to security can be executed at any layer of a complete information security procedure. Whether you are accessing the single system form your home or you have thousands of employee enterprise with the wide area network, by using the layered approach with security mechanisms deployment can help improve your security
Dictionary definition of defense is “the effort of protecting from or resisting attack. Originally used in a military context. “Similarly in an information technology (IT) world Defense in depth also called as Castle Approach. Defense in depth is part of an Information Assurance (IA).
Information assurance (IA) is an idea where various zones of security controls (defense) are arranged everywhere an information technology (IT) system. Information assurance (IA) is the method of assuring information and controlling hazards related to the handling application, processing, storage, and transmission of information and the systems and methods used for those objects. Information assurance involves safeguard of the integrity, availability, authenticity, non-repudiation, and confidentiality of user data. Control fails or a vulnerability is utilized that can include perspectives of personnel, Organization procedural, technical and physical protection for the span of the system's life process.
There are three major Controls in Defense in depth
.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.