Question

In: Computer Science

What is the difference between infrastructure security and premises security? List and describe three categories of...

  1. What is the difference between infrastructure security and premises security?
  2. List and describe three categories of physical threats caused by humans.
  3. What are the two requirements for physical security?

Solutions

Expert Solution

Difference between infrastructure security and premises security:

  • Infrastructure security protects the infrastructure of an environment. But, Premises security protects physical premises.
  • Infrastructure security is comparatively cheaper than premises security.
  • Infrastructure security needs no continuous monitoring. But premises security needs continuous monitoring.

3 categories of physical threads caused by human:

1.Natural events:

  • Like flood, earthquake, etc
  • Very hard to plan.
  • Because it is unpredictable.
  • Loss of resources and damage to property.
  • In order to mitigate this, we should always stay alert by using equipment such as sensors, alarms, etc.

2.The intentional act of destruction:

  • Like theft, vandalism, etc.
  • Includes activities like the damage or destruction of the public or private property.
  • We can predict the way of attack so some degree of accuracy.
  • By using proper measures, we can reduce these kinds of threats.

3.Unintentionally destructive acts:

  • Like bad plumbing, spilled drinks, etc
  • Not done intentionally.
  • That is without malicious intent.
  • Careless behavior may lead to this.
  • By doing everything carefully, we can reduce these kinds of threats.

Two requirements of physical security:

1.Understanding what you need to protect.

  • First of all, we need to know or understand what we actually need to protect.
  • Understand about the facilities also and know about what kind of facilities are available, which facilities are to be used and who need to use it.

2.Accessing physical security risks.

  • We need to access the risk of each site that we use separately.
  • And also we need to include them in the risk registers.







Related Solutions

Explain what the paradox of fiction is and list the three premises. Describe a response to...
Explain what the paradox of fiction is and list the three premises. Describe a response to the paradox and identify which premise it targets
Describe fraud. What are the three categories of fraud and list an example of each. Describe...
Describe fraud. What are the three categories of fraud and list an example of each. Describe the fraud triangle. List the key requirements of the Sarbanes-Oxley Act (SOX) List the components of the framework commonly used in corporations when analyzing their internal control systems: List the five common principles of Internal Control and give an explanation and example of each Name two reasons why internal control for cash is important. What does the term “cleared the bank” mean? What are...
1) Describe fraud. 2) What are the three categories of fraud and list an example of...
1) Describe fraud. 2) What are the three categories of fraud and list an example of each. 3) Describe the fraud triangle. 4) List the key requirements of the Sarbanes-Oxley Act (SOX) 5) List the components of the framework commonly used in corporations when analyzing their internal control systems: 1. 2. 3. 4. 5. 6) List the five common principles of Internal Control and give an explanation and example of each 1. 2. 3. 4. 5. 7) Name two reasons...
List and describe the six major categories of benefits administered by the Social Security Association.
List and describe the six major categories of benefits administered by the Social Security Association.
1. What are the three basic manufacturing cost categories? 2. What are the main difference between...
1. What are the three basic manufacturing cost categories? 2. What are the main difference between product costs and period costs? Give examples of each. 3. What is the difference between a fixed cost and a variable cost? Give examples of each. 4. What are differential costs? Opportunity costs? Sunk costs? Be specific and give examples of each. Please review youre grammar before posting the question.
What are the three categories of business entities? List and briefly describe the two primary differences...
What are the three categories of business entities? List and briefly describe the two primary differences between the three categories of business entities.
List and DESCRIBE three distinct categories of jazz and give an example for each.
List and DESCRIBE three distinct categories of jazz and give an example for each.
Q4. Out of three levels of security I.e. Infrastructure security, Application security and Operational security, we...
Q4. Out of three levels of security I.e. Infrastructure security, Application security and Operational security, we can only deal with application security. Although it is the area we work on, but overall security of even our application depends upon the organizational security policies. Do you agree? Comment using an example. Q5. There are 4 types of security threats namely, Interception, interruption, modification and fabrication. As a software programmer, what threat is the one you may work to avoid and how?...
What is the difference between the physician assistant and the medical assistant? List three types of...
What is the difference between the physician assistant and the medical assistant? List three types of technologists and technician who provide diagnostic testing. What types of services are provided by physical, occupational, and respiratory therapists? What professionals provide care in emergency situations? What services are provided by dentists, optometrists, chiropractors, podiatrists, and dietitians/nutritionists? What activities are performed by the health information manager? List three activities performed by billing and coding specialists. Define health administration. Differentiate among a general practitioner, a...
What is Cybersecurity and Infrastructure Security Agency (CISA) and what is its role in infrastructure protection?
What is Cybersecurity and Infrastructure Security Agency (CISA) and what is its role in infrastructure protection?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT