Question: layering limiting diversity obscurity simplicity computer 1 computer 2 computer 3 security defenses should be based on 5 fundamental pricnciples:layering, limiting, diversity, obscurity, and simplicity.
| layering | limiting | diversity | obscurity | simplicity | |
| computer 1 | |||||
| computer 2 | |||||
| computer 3 |
security defenses should be based on 5 fundamental pricnciples:layering, limiting, diversity, obscurity, and simplicity. analyze these layers for 3 computers that you currently use ( school, your place of employment, home, a friends house, etc.)
a. enter the security element of each layer for each of the computers (leave blank any box for which thats security layer does not exist)
b.for each of the elements that you think is inadequate or missing, add what you believe would improve security.
c.provide an analysis of your findings in at least 2 paragraphs
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
