Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 4, Problem 8RQ

Explanation of Solution

Security Framework:

  • In cloud computing, the security framework is a method to make computing free from privacy threats and security risks.
  • The cloud drive is described as reliability, authentication and confidentiality of private data that have been challenged.
  • The cloud account is easily accessible by everyone and at the same time it is more protected.

Management controls:

  • Management controls are security processes executed by the security administration of an organization and are designed by strategic planners.
  • These security controls reviews and addresses risk management to describe the requirement and scope of legal compliance and set rules for the maintenance of the whole security life cycle.
  • It would be applied as piece of the security framework by applying complete instructions for its conduct, as well as address, plan and execute the security scheduling process and security program management.

Operational controls:

  • Operational controls management and does lower-level scheduling function that acts with the operational functionality of protection in the organization...

Blurred answer
Students have asked these similar questions
When developing a plan for security, it is necessary to keep track of three essential components.
Submit a security awareness program proposal. It should be a complete, polished artifact containing all of the critical elements. It should reflect the incorporation of feedback . The proposal will consist of the executive summary, communication plan, proposal introduction, policies and procedures, proposed solutions to the security vulnerabilities, and plans to continuously monitor the organization for malicious behaviors.
A security control is a specific action or procedure provided to protect confidentiality, integrity and availability of information/systems. Explain information security control with respect to the following: (i) Administrative Controls (ii) Technical or Logical Controls (iii) Physical Controls
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,