Identify challenges that must be addressed for a security and access control plan to work effectively.

What will be an ideal response?


Ease of use: Requiring a user to jump through hoops to access a system or complete a transaction will negate the value of security.
Cost vs. risk: Consideration must be given to the dollar amount of the transaction that is being protected.
Internal security risks: There is a possibility that an internal breach will occur.
System defaults: System defaults are usually set at the low end of security coverage.
Standards void: Standards that ensure that technologies, such as biometrics, work together seamlessly are in the process of being developed.

Computer Science & Information Technology

You might also like to view...

MC A common logic error known as a(n)______ occurs when the programmer incorrectly specifies a range.

a) fatal error. b) off-by-one error. c) counting error. d) None of the above.

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The property of each radio button in a group of radio buttons that must be the same for each button is the id property. 2. The checked property can be used to return the state of a checkbox to a JavaScript function. 3. The properties that determine the size of a text box are cols and rows. 4. If the information entered into a textarea box exceeds the number of rows originally set, a scroll bar is created. 5. The two types of buttons that display masked text (such as *'s or #'s) to hide what a user enters are "hidden" and "password".

Computer Science & Information Technology

?Zain, an administrator at PerfDot Inc., creates a form using Microsoft Access 2016Form Wizard. He wants to make to change the font type, font size, and font color of the labels in the form. Which of the following views should Zain use for this purpose?

A. ?Layout view B. ?Form view C. ?Modify view D. ?Data view

Computer Science & Information Technology

An Excel ________ can be embedded in a PowerPoint presentation so the data can be manipulated

Fill in the blank(s) with correct word

Computer Science & Information Technology