Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

princi 3. In the table below, complete the entries in the second column by speci

ID: 3747216 • Letter: P

Question

princi 3. In the table below, complete the entries in the second column by specifying the security applies to each scenario. Scenario Security Principle The data entry employees are given basic user accounts because it is all that is required for their tasks to be completed In order for equipment to be purchased, both the department head and the project manager must sign the procurement form. Users may only go to approved, listed web sites. Various members of the IT staff switch positions to learn each other's jobs. The network is protected with a firewall, packet filtering router, IDS, and personal firewall. Use two different firewalls from different vendors. An internal web server is configured to use port 8080, instead of the usual port 80. After performing a default installation, all services that are not needed are removed

Explanation / Answer

Answer)

There are 3 types of security principles:

1) Preventive or Confidentiality

2) Detective or Integrity

3) Responsive or Availability

In the question the security principles are:

1) Preventive

2) Integrity

3) Availability

4) Availability

5) Integrity

6) Integrity

7) Availability

8) Integrity

Hit like if you find the answer useful. :)

Hope this answer helps. Thanks