Please respond to TWO of the following questions. Each response is a minimum of 200 words and one APA citation each.
1. In your own words describe what is meant by “defense-in-depth” in security design. Give an example of a combination of security controls that you have seen implemented that show how the combination of security factors improve the overall security.
2. The CIA triad is a common way of describing how confidentiality, integrity and availability concerns form the pillars of information security. Give an example from your experience or a technical article you’ve read that describes methods of improving security of information in each area of the CIA triad.
3. After viewing the video on IT Governance, describe the IT governance model and discuss its importance in instituting a comprehensive security program. What are security blueprints?
4. In your own words, describe the personnel best practices of mandatory vacation, separation of powers, principle of least privilege, and job rotation. Give an example of where you have seen these practices applied from your own experience.