Question: Computer Security Principles and Technologies. Practice Time 1. Think over 3 examples of security threats 2. Think over 3 examples of security vulnerabilities associated to

Computer Security Principles and Technologies. Practice Time

1. Think over 3 examples of security threats 2. Think over 3 examples of security vulnerabilities associated to threats listed in previous question 3. Think over 3 examples of resulting security risks

Example: Threat loss of confidential document Vulnerability lack of security training; violation of security rules Risk disclosure of sensitive information to unauthorized parties. Scenario confidential document taken from office by employee and lost / stolen in public location.

Suggest security controls that are required to protect students personal data in ISMA according to security controls classification given in the table below:

note: all cells should be filled in.

Controls Administrative Technical Physical
Directive
Deterrent
Preventive
Detective
Corrective
Recovery
Compensating

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!