FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Giving a new employee access to only what is need for their role is called?
A
Lack of Trust
B
Principle of Least Privilege
C
Micro-Management
D
Theory of Access Control
Explanation: 

Detailed explanation-1: -The principle of least privilege (POLP) is a concept in computer security that limits users’ access rights to only what are strictly required to do their jobs. Users are granted permission to read, write or execute only the files or resources necessary to do their jobs.

Detailed explanation-2: -Definition(s): The principle that a security architecture should be designed so that each entity is granted the minimum system resources and authorizations that the entity needs to perform its function.

Detailed explanation-3: -Information security is a complex, multifaceted discipline built upon many foundational principles. The three most important-confidentiality, integrity, and availability (the CIA triad)-are considered the goals of any information security program.

Detailed explanation-4: -Limitations of Least Privilege For example, suppose a user has a legitimate need to access certain sensitive data. If keylogging software is installed on that user’s machine, that data could be transmitted to a third party without the user’s knowledge.

Detailed explanation-5: -Least privilege is a principle of granting only the permissions required to complete a task. Least privilege is also one of many Amazon Web Services (AWS) Well-Architected best practices that can help you build securely in the cloud.

There is 1 question to complete.