What is the difference between requirements and controls in the security process? Give examples of each.

Answers

Answer 1

Answer:

Security controls are those measures taken to prevent, identify, counteract, and reduce security risks to computer systems, whereas, Security Requirements are guidelines or frameworks that stipulates measures to ensure security control.

Explanation:

Security controls encompass all the proactive measures taken to prevent a breach of the computer system by attackers. Security requirements are those security principles that need to be attained by a system before it can be certified as safe to use.

Security controls are of three types namely, management, operational, and technical controls. Examples of technical controls are firewalls and user authentication systems. A statement like 'The system shall apply load balancing', is a security requirement with an emphasis on availability.


Related Questions

Write a program that create Employee class with fields id,name and sal and create Employee object and store data and display that data.

Answers

Answer:

Here is the C++ program for Employee class with fields id,name and sal.

#include <iostream>  // to use input output functions

#include <string>  //to manipulate and use strings

using namespace std;   // to access objects like cin cout

class Employee {  //class Employee

private:  

/* the following data members are declared as private which means they can only be accessed by the functions within Employee class */

  string name;  //name field

  int id; //id field

  double sal;   //salary field

public:    

  Employee();  // constructor that initializes an object when it is created

/* setName, setID and setSalary are the mutators which are the methods used to change data members. This means they set the values of a private fields i.e. name, id and sal */

  void setName(string n)  //mutator for name field

     { name = n; }        

  void setId(int i)  //mutator for id field

     { id = i; }        

  void setSalary(double d)  //mutator for sal field

     { sal = d; }  

/* getName, getID and getSalary are the accessors which are the methods used to read data members. This means they get or access the values of a private fields i.e. name, id and sal */

  string getName()  //accessor for name field

     { return name; }        

  int getId()  //accessor for id field

     { return id; }        

  double getSalary()  //accessor for sal field

     { return sal; }  };  

Employee::Employee() {  //default constructor where the fields are initialized

  name = "";  // name field initialized

  id = 0;  // id field initialized to 0

  sal = 0;   }   // sal field initialized to 0

void display(Employee);  

// prototype of the method display() to display the data of Employee

int main() {  //start of the main() function body

  Employee emp;  //creates an object emp of Employee class

/*set the name field to Abc Xyz which means set the value of Employee class name field to Abc Xyz  through setName() method and object emp */

  emp.setName("Abc Xyz");  

/*set the id field to 1234 which means set the value of Employee class id field to 1234  through setId() method and object emp */

  emp.setId(1234);

/*set the sal field to 1000 which means set the value of Employee class sal field to 1000  through setSalary() method and object emp */

  emp.setSalary(1000);    

  display(emp);  }   //calls display() method to display the Employee data

void display(Employee e) {  // this method displays the data in the Employee //class object passed as a parameter.

/*displays the name of the Employee . This name is read or accessed through accessor method getName() and object e of Employee class */

  cout << "Name: " << e.getName() << endl;  

/*displays the id of the Employee . This id is read or accessed by accessor method getId() and object e */

  cout << "ID: " << e.getId() << endl;

/*displays the salary of the Employee . This sal field is read or accessed by accessor method getSalary() and object e */

  cout << "Salary: " << e.getSalary() << endl;  }

Explanation:

The program is well explained in the comments mentioned with each statement of the program.

The program has a class Employee which has private data members id, name and sal, a simple default constructor Employee(), mutatator methods setName, setId and setSalary to set the fields, acccessor method getName, getId and getSalary to get the fields values.

A function display( ) is used to display the Employee data i.e. name id and salary of Employee.

main() has an object emp of Employee class in order to use data fields and access functions defined in Employee class.

The output of the program is:

Name: Abc Xyz                                                                                                      

ID: 1234                                                                                                                  

Salary: 1000

The program and its output are attached.

Other Questions
What is the one single most important reason that human impact on the planet has been so great? Explain the methods of passive transport that move molecules across the plasma membrane of the cell. Give the three-letter name of each of the angles in the drawing below. Lines and Angles a. 1 b. 2 c. 3 d. 4 A production possibilities frontier can shift outward if Group of answer choices The economy abandons inefficient production methods in favor of efficient production methods. Economy experiences economic downturn. There is a technological improvement. Resources are shifted from the production of one good to the production of the other good. Below are the times (in days) it takes for a sample of 17 customers from Andrew's computer store to pay their invoices.19.15, 43, 39, 35, 31, 27, 34, 34, 30, 30, 26, 26, 26, 21, 21, 17Draw the histogram for these data using an initial class boundary of 14.5, an ending class boundary of 49.5, and 5 classes of equal width. Note that you can addor remove classes from the figure. Label each class with its endpoints.FrequencyI:lo 11:0 8 ?00Time (in days)CheckSave For LaterSubmit Assignment In a competition, two people will be selected from four finalists to receive the first and second prizes. The prize winners will be selected by drawing names from a hat. The names of the four finalists are Jim, George, Helen, and Maggie. The possible outcomes can be represented as follows: JG JH JM GJ GH GM HJ HG HM MJ MG MH Here, for example, JG represents the outcome that Jim receives the first prize and George receives the second prize. The event A is defined as follows: A = event that Helen gets first prize List the outcomes that comprise the event ~A (not A). Does anybody know how to do q4. Please show working out thanks. pls help me with number 10 Suppose you invested $100 in the Ishares High Yield Fund (HYG) a month ago. It paid a dividend of $2 today and then you sold it for $101. What was your dividend yield and capital gains on the investment Which of the following statements could be used in the proof? For each situation, list the assumption, principle, or constraint that has been violated, if any. A) East Lake Company recognizes revenue at the end of the production cycle but before sale. The price of the product, as well as the amount that can be sold, is not certain. B) Hilo Company is in its fifth year of operation and has yet to issue financial statements.C) Gomez, Inc. is carrying inventory at its original cost of $100,000. Inventory has a fair value of $110,000. D) Bly Hospital Supply Corporation reports only current assets and current liabilities on its balance sheet. Equipment and bonds payable are reported as current assets and current liabilities, respectively. Liquidation of the company is unlikely debited the "Computers" account.E) Chieu Company has inventory on hand that cost $400,000. Chieu reports inventory on its balance sheet at its current fair value of $425,000. F) Toxy Syles, president of Classic Music Company, bought a computer for her personal use. She paid for the computer by using company funds debited the "Computers" account.A. Going concern assumptionB. Periodically AssumptionC. Historial Cost PrincipleD. Revenue Recognition PrincipleE. Economic Entity AssumptionF. No Violation Help with this huge essay plzz Dogstuff adjusts salaries based on changes in its stock price, which has increased consistently at one fifth its value per year. Yearly raises are the same fraction of the current salary as the yearly fractional change in stock prices. Hector currently earns $31 comma 500 per year at Dogstuff. Find last year's salary, the salary in 2 years, and the salary 2 years ago. A 28-turn circular coil of radius 4.40 cm and resistance 1.00 is placed in a magnetic field directed perpendicular to the plane of the coil. The magnitude of the magnetic field varies in time according to the expression B = 0.010 0t + 0.040 0t2, where B is in teslas and t is in seconds. Calculate the induced emf in the coil at t = 4.20 s. 0.0000302 in scientific notation find the height of a tree whose shadow is 42m long when the shadow of a man 1.8m tall is 2.4m long Help !!!! Match the written mathematical operation to the equivalent symbolic form PLEASE HURRYY!!Which societal issue sparked the conversation movement in the United States? Alcohol abuseIndustrial growth Education reform Tenement neglect find the value of x in the isoscleles triangle sqrt45 and altitude 3 Stuck Right now, Help would be appreciated :)