Operations Security Discussion2

I’m stuck on a Computer Science question and need an explanation.

Organizations of any size can have millions of transactions occurring every day between customers, employees, and suppliers. Today, many systems are automated. They generate their own transactions in the form of online product queries, searches, inventory checks, authorization checks, and log entries. Chapter 4 introduces the IT environment segregated into seven domains.

  • Explain the concept of defense-n-depth.
  • How does the use of security policies mitigate risks within the seven domains of a typical IT infrastructure? Explain
  • Discuss two methods for developing access control.

To participate in the Discussion, respond to the Discussion prompt by Day 3. Then, read a selection of your colleagues’ postings. Finally, respond to at least two classmates in one or more of the following ways:

• Share an insight from having read your colleague’s posting.
• Offer and support an opinion.
• Validate an idea with your own experience.
• Make a suggestion.

• Expand on two of your colleagues’ postings.