Humans are said to be the weakest link in any security system. Give an example for each of the following:
What will be an ideal response?
a. A situation in which human failure could lead to a compromise of encrypted data
b. A situation in which human failure could lead to a compromise of identification and authentication
c. A situation in which human failure could lead to a compromise of access control
Example answers: (a) Installing malware on a machine on which the data is decrypted; choosing too weak an encryption method. (b) Choosing weak passwords; choosing weak security questions. (c) Writing software that fails to properly enforce access control.
You might also like to view...
Based on what you know about e-commerce, how would you have tested a new Web-based system?
What will be an ideal response?
Suppose that ComputerA is trying to connect with another computer on the same network (ComputerB) with an IP address of 192.168.1.200. Describe what happens in making the connection.
What will be an ideal response?
To ensure that your questions don't vary between usability testers, it's considered a good practice to create a script and to use it consistently throughout the testing process. _________________________
Answer the following statement true (T) or false (F)
While not as detail-rich as vector images, bitmap graphic files are smaller and can be enlarged without losing image quality.?
Answer the following statement true (T) or false (F)