Question: The main threats that physical security components combat are theft, interruptions to services, physical damage, compromised systems and environment integrity, and unauthorized access. However, the

The main threats that physical security components combat are theft, interruptions to services, physical damage, compromised systems and environment integrity, and unauthorized access. However, the information held within the equipment may be much more valuable than the equipment itself.

Which controls we choose to use to mitigate risks to our information depend not only on the value we assign to that information, but also on the dynamic state of that information. Our data exists in one of three states: at rest (like hard disk drives & backup tapes), in motion (like over the internet or network), and in use (like in our RAM).

You work for a large corporation (like Home Depot, Target, Costco, Bank of America, Walmart, etc.) as a security professional. Choose one of these companies and one of these data states (data at rest, in motion or in use). Identify 10 data security controls for that data that you would implement at your company. Always state your references (textbook or internet).

Your initial post should be 100-150 words and reply with a quality question to 2 classmates for full credit.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!