Question: Explain how to use defense in depth (also called layered defense) to protect your own personal computing device against the risks it faces. Also define

  1. Explain how to use defense in depth (also called layered defense) to protect your own personal computing device against the risks it faces.

  1. Also define the risks and explain which of the confidentiality, integrity and availability properties are at risk in your device.

This device could be your own personal computer, mobile device (e.g. smartphone), etc. What would it mean to apply these ideas in protecting your particular device and how you use it?

2. Choose a real organization (for example hospital, military organization, bank, online business) you are familiar with or interested in, and perform an assessment of the following

(a) What are their information technology assets?

(b) What risks do the assets face?

(c) What threat agents are expected?

(d) Make a profile of an insider in this organization, explaining what attacks they could carry out

(e) Finally, develop a set of requirements and controls you argue will address the risks.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!