Explanation of Solution
Guards:
The non-living things such as fences, walls are static in nature. They cannot respond to unauthorized access. The living guards such as securities, soldiers are the one who protect the facilities and assets. Their work is to safeguard the place from fire or theft.
Guards – effective form of control:
Guards are considered as the effective form of control, because; they can predict every situation and make responses to it. Every guard has clear “standard operating procedures (SOPs)” that aid them to act assertively in unfamiliar circumstances.
Guards are expensive:
Guards act dynamically and they protect the place from theft. It requires proper recruitment of human resources...
Trending nowThis is a popular solution!
Chapter 9 Solutions
Principles of Information Security (MindTap Course List)
- An incident's containment strategy is defined as follows: Give an example and then explain about it in detail.arrow_forwardWhile society expects businesses to be prepared for disasters and to recover using their own resources, it does not appear that individuals are equipped to endure a crisis. Should we expect the government, at any level, to be in charge of catastrophe recovery, whether at the personal or commercial level? If so, why or why not? What kind of concessions would a company have to make if the catastrophe recovery process was handed over to a government agency?arrow_forwardWhat is it about paperwork that makes it so crucial to the effective conduct of a criminal investigation? Make a list of the bare minimum non-computer-specific documentation that is necessary in every given situation.arrow_forward
- Why is documentation so important in a thorough criminal investigation, and what role does it play? Determine the bare minimum of paper work outside the realm of computers that would be required for a probe.arrow_forwardAre the preventive procedures sufficient to ensure the safety of the information system? Alternatively, is everything random or is there a method to ensure anything?arrow_forwardDeveloping a threat model is a complicated process.arrow_forward
- The second step in threat modelling is to identify technologies and security measures that you are already aware of.arrow_forwardWhat are the different methods a scrum team could handle a deviation including reactive and preventive methods?arrow_forwardHow do you go about creating a threat model?arrow_forward
- Compare and contrast some specific types of defensive techniques that would be sufficient to deter an apprentice-level intruder to what would be needed to keep out a master-level intruder.arrow_forwardOne of the challenges associated with computer security is that it is frequently considered an afterthought, or something that should be added into a system after it has been designed, rather than being regarded as an essential component of the design process from the very beginning. This is one of the primary reasons why computer security is so problematic. If safety is treated as an afterthought, it is vital to investigate the repercussions for just a moment.arrow_forwardAfter reading the case presented in the module, write a short response to the following discussion questions and ethical decision making scenario. Discussion Questions Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that? How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance? Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?arrow_forward
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,