Chapter 6
- Choose a security triumvirate and explain it in your own words.
The three triumvirates discussed in this chapter were people, process, and technology; confidentiality, integrity, and availability; and people, data, and threats. (Section: Security triumvirates)
- What are some of the challenges with the traditional information security model?
Traditional security models often are techno-centric and do not use the security triumvirates discussed previously. Instead, they focus on the technology used and therefore are vulnerable to change. (Section: Challenges with the traditional information security model)
- What is the information life cycle? What are its stages?
The information life cycle defines the stages of the life of information in an environment. The stages are creation, storage, use, sharing, and destruction. (Section: Protecting information)
- What is a workload?
A workload is a program or application that runs on...