Explain how laws affect information security professionals| Information Systems
QUESTION 1
Describe the CIA Triad and give an example of how it is used.
Your response should be at least 200 words in length.
QUESTION 2
What are two most common approaches of defense models? Compare and contrast them. Provide examples of how they are used.
Your response should be at least 200 words in length.
QUESTION 3
Explain zones of trust and give an example of how they are used.
Your response should be at least 200 words in length.
QUESTION 4
Explain how laws affect information security professionals, and give an example of how they are used.
Your response should be at least 200 words in length.
o