Which of the following describes a key challenge in integrating security principles into complex university systems, particularly concerning legacy infrastructure and diverse stakeholder requirements?
Question 2
In the context of 'Security by Design' for university systems, what is the most effective approach to 'threat modeling' when dealing with highly sensitive research data?
Question 3
When designing a secure university system, which 'mitigation' strategy is most crucial for protecting against advanced persistent threats (APTs) targeting intellectual property?
Question 4
Consider a university's student information system that processes sensitive personal data. Which principle of 'Security by Design' would primarily guide the architectural decision to encrypt data both at rest and in transit?
Question 5
A university is developing a new online learning platform. To integrate security effectively from the outset, which of the following actions should be prioritized during the initial requirements gathering phase?