Given the network security applications and countermeasures in the first column of the table below, explore answers to the following questions:
Where does the application or countermeasure belong in the seven domains of a typical IT infrastructure? An application or countermeasure may span two or more domains.
What confidentiality, integrity, and availability (CIA) function(s) does the countermeasure provide?
Provide your answers in the table below.
Given the network security applications and countermeasures in the first column of the table below, explore answers to...
The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...
A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...