The concept of “need-to-know” states:

a. Paths to data containing sensitive information should not be published
b. Documents should be marked as “confidential” and distribution kept to a minimum
c. Individual personnel should have access to only the information they require to perform their jobs
d. Documents should be marked as “restricted” and distribution kept to a minimum


c. Individual personnel should have access to only the information they require to perform their jobs

Computer Science & Information Technology

You might also like to view...

Unlike citations from books, Web citations have no information listed for ________

A) name B) author C) year D) page number

Computer Science & Information Technology

For what reason are the designers of UAVs trying to use machine learning?

What will be an ideal response?

Computer Science & Information Technology

A hyperlink is a word, phrase, or image that connects webpages.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____________ method uses the same identifier as other method, but has a different number and/or type of parameter from the other one.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology