Question: CSC 3 8 8 , Secure Computing Assignment # 1 Security Principle Scenarios In the table below, complete the entries in the second column by

CSC 388, Secure Computing
Assignment #1
Security Principle Scenarios
In the table below, complete the entries in the second column by specifying the security principle that applies to each scenario.
\table[[Scenario,Security Principle],[\table[[The data entry ermployees are given basic user],[accounts because it is all that is required for],[their tasks to be completed.]],],[\table[[In order for equipment to be purchased, both],[the department head and the project manager],[must sign the procurement form.]],],[\table[[Users may only go to approved, listed web],[sites.]],],[\table[[Various members of the IT staff switch],[positions to learn each other's jobs.]],],[\table[[The network is protected with a firewall, packet],[filtering router, IDS, and personal firewall.]],],[\table[[Use two different firewalls from different],[verdors.]],],[\table[[After performing a default installation, all],[services that are not needed are removed.]],],[8080, instead of the usual port 80.,]]
 CSC 388, Secure Computing Assignment #1 Security Principle Scenarios In the

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!