COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
encryption
|
|
hiring practices
|
|
background checks
|
|
guard dogs
|
|
policies and procedures
|
Detailed explanation-1: -policies and procedures. encryption. background checks. hiring practices. intrusion detection system (IDS) guard dogs. 23-May-2022
Detailed explanation-2: -Three main access control models are in use today: Role-Based Access Control (RBAC), Discretionary Access Control (DAC), and Mandatory Access Control (MAC). In RBAC, the job function of the individual determines the group he is assigned to and determines the level of access he can attain on certain data and systems.
Detailed explanation-3: -Examples include physical controls such as fences, locks, and alarm systems; technical controls such as antivirus software, firewalls, and IPSs; and administrative controls like separation of duties, data classification, and auditing.
Detailed explanation-4: -Information classification. Personnel procedures. Investigations. Testing. Security-awareness and training.
Detailed explanation-5: -Discretionary access control (DAC) A discretionary access control system, on the other hand, puts a little more control back into leadership’s hands. Rule-based access control. Identity-based access control. 09-Mar-2023