Question
Book Icon
Chapter 1, Problem 11RQ
Program Plan Intro

Information Security:

The securing process of the confidential data in a system or an organization from the unauthorized users like hackers or attacker is known as information security.

Top-down Approach:

  • Top-down approach is the division of system into sub systems which are done to gain the information effectively.
  • In this, every first level sub system will have more authority than its next level sub system.
  • Though the top level system and bottom level sub systems are not connected directly but they will have the contact through the other middle level sub systems.

Bottom-up Approach:

  • Bottom-up approach is the centralization of sub systems to a single system in order to maintain the data potently.
  • In this, every low level sub system will have more authority than it’s above level sub system.
  • Both the bottom and top level sub systems are connected indirectly through the middle level subsystems.

Blurred answer
Students have asked these similar questions
What are the advantages of a top-down approach to information security as opposed to a bottom-up one?
What distinguishes the top-down approach to information security from the bottom-up approach b?
What are the advantages of adopting a top-down approach to information security rather than a bottom-up one?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning