Security Arch

Chapter 8 and 9 provided an overview of Defensive Tactics and Technologies and Trade-Offs when addressing threats. Data tampering has become a significant problem in the US and many other countries abroad. You can read an article here that discusses this in more detail:

The Risks of Data Tampering and How to Prevent It


After reading chapter 8 and 9, you’re ready to participate in the next discussion.
In your textbook, it discusses issues around integrity and specific Tactics for Integrity (p. 149). The author identifies three main ways to address tampering threats: Permissions/ACLs, Use of Cryptographic mechanisms, and the use of logging technology and audit activities as a deterrent.
Please answer the following questions in paragraph form only:

How does having proper permissions and correct access control lists in place help with reducing tampering threats for integrity? 
How does the use of cryptographic mechanisms help with reducing tampering threats for integrity?
How does the use of logging technology and audit activities provide a deterrent when addressing issues related to tampering threats for integrity?

I know that much of this information is in your textbook, but I am looking for information from OTHER RESOURCES as well to fully answer the questions above.
You must do the following:
1) Create a new thread. As indicated above, please answer the following questions above. You must use a minimum of three unique references for your initial posts that are preferably from scholarly sources other than your textbook. Also, please cite all references and use proper APA formatting. 
2) Select AT LEAST 2 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread of your classmates. Feel free to agree or disagree (provides reason why it may still be effective), but please keep it professional and provide support for your stance as opposed to just verbal statements. 
ALL original posts and responses to other students must be substantive. (I’m looking for more than just “I agree.”)
Initial posts are due by Thursday, July 25th (20% penalty if submitted late)
Responses to other students are due by Sunday, July 28th (no late submissions will be accepted or graded for responses to other students pass the due date)
Please ask questions if you need assistance on this and please do wait until the last minute for clarification.

find the cost of your paper

Case Study 2: Disaster Recovery (DR) Lessons Learned: September 11th

  Case Study 2: Disaster Recovery (DR) Lessons Learned: September 11th       Read the article titled “9/11: Top lessons learned for disaster recovery,” from Computerworld.com, located at http://www.computerworld.com/s/article/9219867/9_11_Top_lessons_learned_for_disaster_recovery , and….

zeek

  Option #2: How to Deal with a Project that is Off Course There are many examples of projects that have gone off course. Often times, a new project manager….

1 pg Public Health Discussion “EHRs and Disease Surveillance Systems in Canada

Due 7/12/18 9 p.m EST 1 PG not including min 3 references ( EHRs and disease surveillance systems in Canada     In today’s technology-driven world, communication often occurs through….