Bundle: Principles Of Information Security, Loose-leaf Version, 6th + Lms Integrated Mindtap Computer Security, 1 Term (6 Months) Printed Access Card
Bundle: Principles Of Information Security, Loose-leaf Version, 6th + Lms Integrated Mindtap Computer Security, 1 Term (6 Months) Printed Access Card
6th Edition
ISBN: 9781337750738
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Question
Book Icon
Chapter 1, Problem 11RQ
Program Plan Intro

Information Security:

The securing process of the confidential data in a system or an organization from the unauthorized users like hackers or attacker is known as information security.

Top-down Approach:

  • Top-down approach is the division of system into sub systems which are done to gain the information effectively.
  • In this, every first level sub system will have more authority than its next level sub system.
  • Though the top level system and bottom level sub systems are not connected directly but they will have the contact through the other middle level sub systems.

Bottom-up Approach:

  • Bottom-up approach is the centralization of sub systems to a single system in order to maintain the data potently.
  • In this, every low level sub system will have more authority than it’s above level sub system.
  • Both the bottom and top level sub systems are connected indirectly through the middle level subsystems.

Blurred answer
Students have asked these similar questions
i would like to get help to resolve the following case
Challenge: Assume that the assigned network addresses are correct. Can you deduce (guess) what the network subnet masks are?  Explain while providing subnet mask bits for each subnet mask.  [Hint:  Look at the addresses in binary and consider the host ids]
What is the main difference between Static routing and Dynamic routing (OSPF)? in terms of either wildcard mask or subnet mask, or especially for increasing the number of networks, explaining the reason while providing a specific example like what command they use in CLI
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
MIS
Computer Science
ISBN:9781337681919
Author:BIDGOLI
Publisher:Cengage
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning