Question: data and network security subject or information security QUESTION 1 [25 MARKS] (a) Employees are increasingly having access to company networks locally and remotely via

data and network security subject or information security

QUESTION 1 [25 MARKS] (a) Employees are increasingly having access to company

QUESTION 1 [25 MARKS] (a) Employees are increasingly having access to company networks locally and remotely via computers and mobile devices such as laptops, tablets and smartphones. Local and remote access needs to satisfy five essential security requirements to be efficient and secured. Identify and briefly explain each of these FIVE (5) security requirements. [10 Marks] (b) Confidentiality, Integrity and Availability are the core attributes in security. Identify FOUR (4) threats to a wireless network that could compromise security. State the security attribute that can be compromised by each threat. [8 Marks] (c) Eka and Imran are having a debate about computers and network security. Eka says that it is the job of security professionals to find all vulnerabilities and every threat and make sure the system is always 100% secured. However, Imran argues with Eka as he is aware of vulnerability in the context of network security. They have asked you to decide who is correct. Describe what vulnerability is. Determine whether you agree with Eka or not. Justify your answer with ANY THREE (3) reasons. [7 Marks]

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a The five essential security requirements for local and remote access to company networks are 1 Authentication Authentication ensures that users are who they claim to be before granting access to the ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!