Components in a typical security policy
There are numerous components in a typical security policy. Explain three important components.
Expert
Be it the network security, computer security or information security a typical security policy helps prevent inconsistencies by forming the basis for detailed standards, guidelines, and procedures. Policies make clear management's expectations of employee involvement in protecting information assets. Three basic and important components of a security policy are as follows
1. Purpose: This defines the objective of the security policy whether it is required to improve recovery time, to reduce cost/downtime, or management of overall confidentiality, integrity, and availability.
2. Scope and responsibilities: This provides on whom and what are covered by the policy such as facilities, technology, processes etc. and who is responsible to carry out the same.
3. Compliance: After the awareness program this component provides the effective enforcement of security policy.
Explain the primitive operations which are used in the RC5?
Explain the term power analysis?
What are the methods used by a station to sense whether a station is idle or busy? Explain with a neat diagram.
Explain difference between the Sub Word and Sub Bytes?
State the difference between equivalent inverse cipher and AES decryption algorithm?
List significant design considerations for the stream cipher.
Explain some of the limitations of the SMTP/RFC 822?
State the purpose of State array?
Specify the ways through which the secret keys may be distributed to the two communicating parties.
WEP (wired equivalent privacy): Wired equivalent privacy is capable of providing the same level of privacy as it is there in the wired network. The WEP makes use of a static key which both the access points and the clients know. The static key helps i
18,76,764
1956034 Asked
3,689
Active Tutors
1457506
Questions Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!