princi 3. In the table below, complete the entries in the second column by speci
ID: 3747216 • Letter: P
Question
princi 3. In the table below, complete the entries in the second column by specifying the security applies to each scenario. Scenario Security Principle The data entry employees are given basic user accounts because it is all that is required for their tasks to be completed In order for equipment to be purchased, both the department head and the project manager must sign the procurement form. Users may only go to approved, listed web sites. Various members of the IT staff switch positions to learn each other's jobs. The network is protected with a firewall, packet filtering router, IDS, and personal firewall. Use two different firewalls from different vendors. An internal web server is configured to use port 8080, instead of the usual port 80. After performing a default installation, all services that are not needed are removedExplanation / Answer
Answer)
There are 3 types of security principles:
1) Preventive or Confidentiality
2) Detective or Integrity
3) Responsive or Availability
In the question the security principles are:
1) Preventive
2) Integrity
3) Availability
4) Availability
5) Integrity
6) Integrity
7) Availability
8) Integrity
Hit like if you find the answer useful. :)
Hope this answer helps. Thanks
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.