What are the goals of a security policy?

What will be an ideal response?


A security policy should have three goals:
1. To prevent the hacker from getting access to critical data
2. To slow down the hacker enough to be caught
3. To frustrate the hacker enough to cause him or her to quit the hacking attempt

Computer Science & Information Technology

You might also like to view...

If you accidentally delete the /etc/aliases file, how could you easily re-create it (assuming that you had not restarted sendmail)?

What will be an ideal response?

Computer Science & Information Technology

Most web animations are created with HTML5.   

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Animation is created using a technique called _______ , which uses a sequence of bitmap images in which one or more objects are changed slightly from frame to frame.

A. in-betweening B. frame to frame C. transitioning D. 3-D imaging

Computer Science & Information Technology

You can use the Rectangular Marquee tool to create a square.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology