Question: layering limiting diversity obscurity simplicity computer 1 computer 2 computer 3 security defenses should be based on 5 fundamental pricnciples:layering, limiting, diversity, obscurity, and simplicity.

layering limiting diversity obscurity simplicity
computer 1
computer 2
computer 3

security defenses should be based on 5 fundamental pricnciples:layering, limiting, diversity, obscurity, and simplicity. analyze these layers for 3 computers that you currently use ( school, your place of employment, home, a friends house, etc.)

a. enter the security element of each layer for each of the computers (leave blank any box for which thats security layer does not exist)

b.for each of the elements that you think is inadequate or missing, add what you believe would improve security.

c.provide an analysis of your findings in at least 2 paragraphs

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!