Navigation » List of Schools, Subjects, and Courses » INT 1010 – Introduction to Information Technology » Assignments » Chapter 8 Issues in Computing » Chapter 8 Issues in Computing Sample Answers
Chapter 8 Issues in Computing
Chapter 8 – Issues in Computing
1. Briefly define each of the three members of the information security triad.
2. What does the term authentication mean?
3. What is multi-factor authentication?
4. What is role-based access control?
5. What is the purpose of encryption?
6. What are two good examples of a complex password?
7. What is a firewall?
8. What is a code of ethics? What is one advantage and one disadvantage of a code of ethics?
9. What does the term personally identifiable information mean?
Chapter 8 Issues in Computing Answer
- Briefly define each of the three members of the information security triad.
- Confidentiality – only authorized individuals can access sensitive information and uses encryption techniques to safeguard the data.
- Integrity – data should be maintained and not be modified.
- Availability – data should be readily available to users
- What does the term authentication mean?
– authentication is the process of verifying the identity of the user, process or device to allow access in resources in the information system.