1. In your own words describe what is meant by “defense-in-depth” in security design. Give an example of a combination of security controls that you have seen implemented that show how the combination of security factors improve the overall security.
  2. The CIA triad is a common way of describing how confidentiality, integrity and availability concerns form the pillars of information security. Give an example from your experience or a technical article you’ve read that describes methods of improving security of information in each area of the CIA triad.
  3. Explain the differences between Patents, Copyrights, and Trademarks in terms of idea, expression, and symbol.
  4. Describe intellectual property laws. What clauses should a termination policy contain to prevent disclosure of an organization’s information?