Author Question: List five areas exposed to threats and vulnerabilities where security must be applied. What will ... (Read 68 times)

bobbie

  • Hero Member
  • *****
  • Posts: 592
List five areas exposed to threats and vulnerabilities where security must be applied.
 
  What will be an ideal response?

Question 2

A ________ is a general-purpose mechanism in modeling tools for grouping related items within a hierarchical structure.
 
  A) UML model
  B) stereotype
  C) layer
  D) package



IAPPLET

  • Sr. Member
  • ****
  • Posts: 333
Answer to Question 1

Any combination of the following.
 Personnel security: The organization should have a policy that clearly identifies who has the authorization to enter, modify, access data. Adequate checks, such as passwords, must be completed to grant role-based access to data. The risk here becomes increasingly important with the size of the users. Security checks on critical personnel are common in many large organizations.

 Application security: All mission-critical (software, hardware, firmware) applications are secure from unauthorized access. This includes all possible means, from password protection to secured physical vaults.

 Operating systems security: From personal laptops to highly distributed operating systems, major functions of the operating systems should be secured: memory management, access to I/O devices, file management, and hardware configuration.

 Network security: Unauthorized viewing and tampering of networks is a much-sought-after target for hackers. Particular attention should be paid to communication devices that serve as a gateway to the organization's computing platform.

 Middleware and Web services security: With the proliferation of open-source applications, middleware affords more possibilities for security breaches. IT security staff should frequently review the mddleware architectures and define a unified view of security across heterogeneous middleware systems, and provide a basis for decentralized policy for middleware security.

 Facility security: All physical rooms where information systems are installed should be fully protected with entry locks, security guards, and cameras.

 Egress security should be enforced: Policy for taking out sensitive documents should be clearly given to personnel. Sensitive data printed on paper should be stored in safes. Unused documents should be shredded. When sensitive equipment is sent out for maintenance or repair, proper security procedures must be enforced.

Answer to Question 2

D



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

A seasonal flu vaccine is the best way to reduce the chances you will get seasonal influenza and spread it to others.

Did you know?

There are actually 60 minerals, 16 vitamins, 12 essential amino acids, and three essential fatty acids that your body needs every day.

Did you know?

Tobacco depletes the body of vitamins A, C, and E, which can result in any of the following: dry hair, dry skin, dry eyes, poor growth, night blindness, abscesses, insomnia, fatigue, reproductive system problems, sinusitis, pneumonia, frequent respiratory problems, skin disorders, weight loss, rickets, osteomalacia, nervousness, muscle spasms, leg cramps, extremity numbness, bone malformations, decayed teeth, difficulty in walking, irritability, restlessness, profuse sweating, increased uric acid (gout), joint damage, damaged red blood cells, destruction of nerves, infertility, miscarriage, and many types of cancer.

Did you know?

Dogs have been used in studies to detect various cancers in human subjects. They have been trained to sniff breath samples from humans that were collected by having them breathe into special tubes. These people included 55 lung cancer patients, 31 breast cancer patients, and 83 cancer-free patients. The dogs detected 54 of the 55 lung cancer patients as having cancer, detected 28 of the 31 breast cancer patients, and gave only three false-positive results (detecting cancer in people who didn't have it).

Did you know?

About 100 new prescription or over-the-counter drugs come into the U.S. market every year.

For a complete list of videos, visit our video library