Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Textbook Question
Chapter 1, Problem 1E
Assume that a security model is needed to protect information used in the class you are taking–say, the information in your course’s learning management system. Use the CNSS model to identify each of the 27 cells needed for complete information protection. Write a brief statement that explains how you would address the components represented in each of the 27 cells.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
In this project, design your own case study involving a hypothetical cybersecurity scenario. After coming up with your case outline, you must identify:
1. The various types of stakeholders potentially affected by the case, and the differentstakes/interests they have in the outcome.2. The different types of cybersecurity professionals or practitioners that might be involved in a case like this, and their specific responsibilities.3. The potential benefits and risks of harm that could be created by effective or ineffective cybersecurity practices in the case, including ‘downstream’ impacts.4. The ethical challenges most relevant to this case 5. The ethical obligations to the public that such a case might entail for the cybersecurity professionals involved.6. Any potential in the case for disparate impacts on others, and how those impacts might affect the lives of different stakeholders
7. The ethical best-case scenario (the best outcome for others that the cybersecurity practitioners…
Q. Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would address the three components occupying that cell.
Additional Information:
Course Name: Information Security
Assume that a security model is needed to protect information used in the class you are taking—say, the information in your course’s learning management system. Use the CNSS model to identify each of the 27 cells needed for complete information protection. Write a brief statement that explains how you would address the components represented in each of the 27 cells.
Chapter 1 Solutions
Management Of Information Security
Ch. 1 - Prob. 1RQCh. 1 - Prob. 2RQCh. 1 - Prob. 3RQCh. 1 - Prob. 4RQCh. 1 - Prob. 5RQCh. 1 - Prob. 6RQCh. 1 - Prob. 7RQCh. 1 - Prob. 8RQCh. 1 - Prob. 9RQCh. 1 - Prob. 10RQ
Ch. 1 - Prob. 11RQCh. 1 - Prob. 12RQCh. 1 - Prob. 13RQCh. 1 - Prob. 14RQCh. 1 - Prob. 15RQCh. 1 - Prob. 16RQCh. 1 - Prob. 17RQCh. 1 - Prob. 18RQCh. 1 - Prob. 19RQCh. 1 - Prob. 20RQCh. 1 - Assume that a security model is needed to protect...Ch. 1 - Prob. 2ECh. 1 - Prob. 3ECh. 1 - Prob. 4ECh. 1 - Prob. 6ECh. 1 - Prob. 1DQCh. 1 - Prob. 2DQCh. 1 - Prob. 1EDM
Additional Engineering Textbook Solutions
Find more solutions based on key concepts
Run the hello, world program on your system. Experiment with leaving out parts of the program, to see what erro...
C Programming Language
Would you select a decoder/driver with active-HIGH or active-LOW outputs to drive a common-cathode 7-segment LE...
Digital Fundamentals (11th Edition)
Explain what is meant by a compensation action and, using an example, show why these actions may have to be inc...
Software Engineering (10th Edition)
A byte is made up of eight a. CPUs b. addresses c. variables d. bits
Starting Out with Java: From Control Structures through Objects (6th Edition)
Using the university schema, write an SQL query to find the IDs of those students who have retaken at least thr...
Database System Concepts
The job of the _____ is to fetch instructions, carry out the operations commanded by the instructions, and prod...
Starting Out With Visual Basic (8th Edition)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Assume that a security model will be required to protect the data from your class. Utilizing the CNSS model, analyse each of the cells and provide a brief comment on how you would manage the three components that reside there.arrow_forwardAssume you'll need a security model to safeguard the information in your class. Examine each cell using the CNSS model and give a brief remark on how you would manage the cell's three components.arrow_forwardAssume that you will need a security model in order to maintain the confidentiality of the information pertaining to your class. Examine each of the cells with the use of the CNSS model, and then provide a brief remark on how you would approach the management of the three components that are found in that cell.arrow_forward
- Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would address the three components occupying that cell.arrow_forward10.This is the model designed for guiding the policies of Information security within a company, firm or organization. What is “this” referred to here?arrow_forwardMake sure you submit your proposal for a security education program. Artifacts that have been finished and polished are supposed to have all their parts. The input that was used to create it should be reflected in its final form. The proposal will include an executive summary, a communication plan, an introduction, the proposal's policies and procedures, the proposal's main body, the proposal's main body, the policies and procedures, the recommended remedies to security weaknesses, and the strategies to constantly monitor the company for hostile conduct.arrow_forward
- Countermeasures come in a variety of sizes, shapes, and levels of complexity. This document endeavors to describe a range of strategies that are potentially applicable to life in education organizations. In an effort to maintain this focus, those countermeasures that are unlikely to be applied in education organizations are not included here. If after your risk assessment, for example, your security team determines that your organization requires high-end countermeasures like retinal scanners or voice analyzers, you will need to refer to other security references and perhaps hire a reliable technical consultant.arrow_forwardDesign a case study involving a hypothetical cybersecurity scenario by using this outline 1. The various types of stakeholders potentially affected by the case, and the differentstakes/interests they have in the outcome.2. The different types of cybersecurity professionals or practitioners that might be involved in a case like this, and their specific responsibilities.3. The potential benefits and risks of harm that could be created by effective or ineffective cybersecurity practices in the case, including ‘downstream’ impacts. 4. The ethical challenges most relevant to this case 5. The ethical obligations to the public that such a case might entail for the cybersecurity professionals involved.6. Any potential in the case for disparate impacts on others, and how those impacts might affect the lives of different stakeholders7. The ethical best-case scenario (the best outcome for others that the cybersecurity practitioners involved could hope to secure from their practice) and a…arrow_forwardInformation security program development and implementation is not a simple process, but it is an absolutely essential and on-going process; particularly if your organization is responsible for maintaining the integrity, availability, and confidentiality of customer information or business-critical data. Explain TWO approaches with the help of a valid diagram to Information Security Implementation in any organization.arrow_forward
- In the area of Information systems security, there are a number of phases that a business will follow to conduct this security. Two of the phases are "Implement controls" and "Review & Update security process". What is the relationship between these two phases regarding their purposes? Do not just state or explain what each of these are, but regarding their overall purposes explain their relationship.arrow_forwardWrite an essay based on the following: Describe three (3) types of computer crime in detail and include examples of organizations that were impacted by each type of crime. Elaborate on how the impact of computer crime is quantified in these situations. Answers must be 100% original. You should use your own words and ideas. Word count requirement is between 200 and 500 words You may include quotes from outside sources that are up to one (1) sentence long only. All quotes must be cited with the appropriate format. Paraphrasing outside sources without the respective citations and failing to add your own ideas is plagiarism. Taking your own ideas that are published elsewhere and not properly citing them is plagiarism. Copying text generated by artificial intelligence such as ChatGPT is plagiarismarrow_forwardFor your initial post, select two parameters in the first column of Table 1 in Section IV of the article A Study of Methodologies Used in Intrusion Detection and Prevention Systems (IDPS). Then describe a situation in which those two parameters would be the most important evaluation criteria. Your situation should be informed by relevant variables from the following list: Industry (e.g., e-commerce, financial, medical) Security team capabilities and skills Potential threat actor motivation (e.g., theft of data, money, or intellectual property; denial of service; political gain)arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
9.1.2 Software Development Approaches; Author: EIToppo;https://www.youtube.com/watch?v=Z9znuSQ7Sz8;License: Standard YouTube License, CC-BY