COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Occurs when a user is given access to a certain piece of data or certain areas of a building
|
Availability
|
|
Accounting
|
|
Authorization
|
|
Administration
|
Explanation:
Detailed explanation-1: -The process by which access to those resources is restricted to a certain number of users is called access control. The authentication process always comes before the authorization process.
Detailed explanation-2: -Authorization is a process by which a server determines if the client has permission to use a resource or access a file. Authorization is usually coupled with authentication so that the server has some concept of who the client is that is requesting access.
There is 1 question to complete.