Question: Explain how to use defense in depth (also called layered defense) to protect your own personal computing device against the risks it faces. Also define
- Explain how to use defense in depth (also called layered defense) to protect your own personal computing device against the risks it faces.
- Also define the risks and explain which of the confidentiality, integrity and availability properties are at risk in your device.
This device could be your own personal computer, mobile device (e.g. smartphone), etc. What would it mean to apply these ideas in protecting your particular device and how you use it?
2. Choose a real organization (for example hospital, military organization, bank, online business) you are familiar with or interested in, and perform an assessment of the following
(a) What are their information technology assets?
(b) What risks do the assets face?
(c) What threat agents are expected?
(d) Make a profile of an insider in this organization, explaining what attacks they could carry out
(e) Finally, develop a set of requirements and controls you argue will address the risks.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
