Chapter 8 Issues in Computing Answer

Navigation   » List of Schools, Subjects, and Courses  »  INT 1010 – Introduction to Information Technology  »  Assignments  »  Chapter 8 Issues in Computing  »  Chapter 8 Issues in Computing Sample Answers

We are showing you only the excerpt of our answer. If you need help with the complete answer email us at

Chapter 8 Issues in Computing

 

Chapter 8 – Issues in Computing
1.    Briefly define each of the three members of the information security triad.

2.    What does the term authentication mean?

3.    What is multi-factor authentication?

4.    What is role-based access control?

5.    What is the purpose of encryption?

6.    What are two good examples of a complex password?

7.    What is a firewall?
 
8.    What is a code of ethics? What is one advantage and one disadvantage of a code of ethics?

9.    What does the term personally identifiable information mean?

 

Need help with your discussion preparation?

Chapter 8 Issues in Computing Answer

 

  1. Briefly define each of the three members of the information security triad.
    1. Confidentiality – only authorized individuals can access sensitive information and uses encryption techniques to safeguard the data.
    2. Integrity – data should be maintained and not be modified.
    3. Availability – data should be readily available to users
  2. What does the term authentication mean?

– authentication is the process of verifying the identity of the user, process or device to allow access in resources in the information system.

This question is taken from INT 1010 – Introduction to Information Technology » Fall 2021 » Assignments