Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The main threats that physical security components combat are theft, interruptions to services, physical damage, compromised systems and environment integrity, and unauthorized access. However, the

The main threats that physical security components combat are theft, interruptions to services, physical damage, compromised systems and environment integrity, and unauthorized access. However, the information held within the equipment may be much more valuable than the equipment itself.

Which controls we choose to use to mitigate risks to our information depend not only on the value we assign to that information, but also on the dynamic state of that information. Our data exists in one of three states: at rest (like hard disk drives & backup tapes), in motion (like over the internet or network), and in use (like in our RAM).

You work for a large corporation (like Home Depot, Target, Costco, Bank of America, Walmart, etc.) as a security professional. Choose one of these companies and one of these data states (data at rest, in motion or in use). Identify 10 data security controls for that data that you would implement at your company. Always state your references (textbook or internet).

Your initial post should be 100-150 words and reply with a quality question to 2 classmates for full credit.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Repairing And Querying Databases Under Aggregate Constraints

Authors: Sergio Flesca ,Filippo Furfaro ,Francesco Parisi

2011th Edition

146141640X, 978-1461416401

More Books

Students also viewed these Databases questions