Describe a defense in depth strategy from an Information Systems Manager perspective; for a medium size organization with 3 campuses. There is one main campus and two satellite campuses. Campuses need communications amongst all campuses and remote workers need access to company data and email. Explain the following in your defense in depth strategy with the following concepts:
a.Confidentiality,
b.Integrity,
c.Availability,
d.Information Security,
e.Risk management,
e.Vulnerability management

Respuesta :

Answer:

Explanation:

Confidentiality: This involves the protection of the information from being accessed by unauthorized persons within or outside of the organization as an attempt by an outsider to access it could lead to a breach which may not be easily remedied.

Integrity: This is concerned with ensuring that the information provided to the users are from a reliable source and that the information is not being altered en-route.

Availability: This means that the information is readily accessible to the authorized users. Any attempt for the unavailability of service or information could have been a denial of service (DNS) from an attacker (black hat).

Risk management: This is the understanding of the security threats and their interaction at an individual, organizational or community level. This involves assessment of possible threats as well as vulnerability.

Vulnerability Management: This is a measure taken in reducing the flaws in codes or networks. This is one of the most easily figured out concept from the five above as there are vulnerability scanners for open ports, insecure software configurations as well as susceptibility to malware  infections.