Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 1, Problem 2E
Program Plan Intro
Committee on National Security Systems (CNSS) Model:
CNSS security model is developed by John McCumber which is also known as McCumber Cube. It has three dimensions namely, Availability, Confidentiality, Education, Integrity, Policy, Processing, Technology Storage and Transmission.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would address the three components occupying that cell.
Suppose that you will need a security model to ensure the confidentiality of the information in your class. Use the CNSS model to take a look inside each cell and then briefly discuss how you may deal with the cell's three constituent parts.
Assume you'll need a security model to safeguard the information in your class. Examine each cell using the CNSS model and give a brief remark on how you would manage the cell's three components.
Chapter 1 Solutions
Principles of Information Security (MindTap Course List)
Ch. 1 - Prob. 1RQCh. 1 - Prob. 2RQCh. 1 - Prob. 3RQCh. 1 - Prob. 4RQCh. 1 - Prob. 5RQCh. 1 - Prob. 6RQCh. 1 - Prob. 7RQCh. 1 - Prob. 8RQCh. 1 - Prob. 9RQCh. 1 - Prob. 10RQ
Ch. 1 - Prob. 11RQCh. 1 - Prob. 12RQCh. 1 - Prob. 13RQCh. 1 - Prob. 14RQCh. 1 - Prob. 15RQCh. 1 - Prob. 16RQCh. 1 - Prob. 17RQCh. 1 - Prob. 18RQCh. 1 - Prob. 19RQCh. 1 - Prob. 20RQCh. 1 - Prob. 1ECh. 1 - Prob. 2ECh. 1 - Prob. 3ECh. 1 - Prob. 4ECh. 1 - Prob. 5ECh. 1 - Prob. 6ECh. 1 - Prob. 1CEDQCh. 1 - Prob. 2CEDQCh. 1 - Prob. 3CEDQCh. 1 - Prob. 1EDMCh. 1 - Prob. 2EDM
Knowledge Booster
Similar questions
- Suppose that in order to keep the information relevant to your class private and secure, you will want some kind of security model. Analyze each of the cells using the CNSS model, and after doing so, provide a few thoughts on how you may go about managing the three components that are located inside that particular cell.arrow_forwardQ. Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would address the three components occupying that cell. Additional Information: Course Name: Information Securityarrow_forwardAssume that you will need a security model in order to maintain the confidentiality of the information pertaining to your class. Examine each of the cells with the use of the CNSS model, and then provide a brief remark on how you would approach the management of the three components that are found in that cell.arrow_forward
- Assume you'll need a security model to protect the data from your class. Make a brief comment on how you would handle the three components that reside in each of the cells after examining them using the CNSS model.arrow_forwardUsing a flow diagram, demonstrate how input validation of usernames/passwords should be performed using the positive security model.arrow_forwardAssume that a security model will be required to protect the data from your class. Utilizing the CNSS model, analyse each of the cells and provide a brief comment on how you would manage the three components that reside there.arrow_forward
- Prepare a power point presentation (PPT) to describe the security vulnerabilities in ATM (automated teller machine) usage that affects a number of small to mid-size ATM card issuers. These vulnerabilities provides a useful case study illustrating that cryptographic functions and services alone do not guarantee security; they must be properly implemented as part of a system. And Explain how these vulnerabilities can be removed. Note: At the end of Chapter 3 you can find useful information related to the topic Case Study: “ ATM Security Problems”arrow_forwardExplain in the detail the elements of the spheres of security model. Document needs to have significant amount of detail explaining each component.arrow_forwardAssume that a security model is needed for the protection of information in school. Using CNSS model, examine each of the cell and write a brief statement on how you would address the three components occupying the cell.arrow_forward
- To learn more about your institution's security rules, look them up on the intranet or website. Is there a corporate security policy somewhere? Where have you come across security rules that are tailored to address a particular problem? What agency or department is in charge of issuing or coordinating all of these policies, or are they dispersed across the organization? Use the framework provided in this chapter to determine whether or not the policies you found in the preceding exercise are complete. What are the omissions in these areas?arrow_forwardUsing concrete examples might help you make your point more clear. In order to be a part of the information security function, conventional personnel practises are merged with controls and integrated with information security concepts in this area.arrow_forwardMultiple security layers must be used in order to protect the opponent from accessing crucial information as good design of security a. Modularity b. Layering c. Psychological acceptability d. Encapsulationarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,