Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Q.2.2 Using suitable examples, explain the importance and role of each of the following incident response and contingency planning concepts in the event an information
Q.2.2 Using suitable examples, explain the importance and role of each of the following incident response and contingency planning concepts in the event an information security compromise or attack has occurred. In your answer, describe how the concept is applied or implemented in an attempt to address the event. A. Incident response. (5 marks) B. Disaster recovery. ( 5 marks) Question 3 (Marks: 2 Q.3.1 Access control is the method by which systems determine whether and how to admit a user into a trusted area of the organisation. Using suitable examples, differentiate between role-based access control (RBAC) and mandatory access control (MAC). In your answer, also state the environment(s) where each access control is used. Q.3.2 Firewalls provide the required protection. (9 Discuss the selection of the right firewall for an organisation using examples and outline five best practices for firewall use once selected. Q.3.3 Use examples to describe each of the following IDPS detection methods: (3 A. Signature-based detection. B. Anomaly-based detection. C. Stateful Protocol Anaysis
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started