Unit 3 Assignment 2: Application, Data, and Host Security - ELO 3.1-3.3
You're a security guard of a jewelry store that just opened. You were asked to
... [Show More] patrol the store, make sure everything goes smoothly, and ensure nothing gets stolen. How would you do this? Would you just watch the customers? Would you just check the doors and locks on the outside of the store? Would you only concern yourself with just the merchandise in the store or with everything, including the personnel? What types of security do you think is needed to make sure everyone and everything, including the store, itself is safe?
Directions: Read the following NIST articles:
Security and Privacy Controls for Federal Information Systems and Organizations
Guide to General Server Security
Guide to Malware Incident Prevention and Handling
When you have finished your reading, explain the difference between application, data, and host security. Your response should be at least two to three paragraphs and should be written at the college level with close attention to proper mechanics. Click the Add Submission button below to type your response. Save changes when you are ready to submit.
Upload Instructions:
Select the Add Submission button below. Click Add, located in the top left hand corner of the File Submission box. The File Picker window will apUnit 3 Assignment 2: Application, Data, and Host Security - ELO 3.1-3.3
You're a security guard of a jewelry store that just opened. You were asked to patrol the store, make sure everything goes smoothly, and ensure nothing gets stolen. How would you do this? Would you just watch the customers? Would you just check the doors and locks on the outside of the store? Would you only concern yourself with just the merchandise in the store or with everything, including the personnel? What types of security do you think is needed to make sure everyone and everything, including the store, itself is safe?
Directions: Read the following NIST articles:
Security and Privacy Controls for Federal Information Systems and Organizations
Guide to General Server Security
Guide to Malware Incident Prevention and Handling
When you have finished your reading, explain the difference between application, data, and host security. Your response should be at least two to three paragraphs and should be written at the college level with close attention to proper mechanics. Click the Add Submission button below to type your response. Save changes when you are ready to submit.
Upload Instructions:
Select the Add Submission button below. Click Add, located in the top left hand corner of the File Submission box. The File Picker window will appear. Click Upload a file and then select the Browse button. Navigate to your file location. Once the file is located, select it and then select the Open button, the Upload this file button, and then the Save changes button. Click Submit Assignment to complete the upload process. Select Send for marking.pear. Click Upload a file and then select the Browse button. Navigate to your file location. Once the file is located, select it and then select the Open button, the Upload this file button, and then the Save changes button. Click Submit Assignment to complete the upload process. Select Send for marking. [Show Less]