Humans are said to be the weakest link in any security system. Give an example for each of the following:

What will be an ideal response?


a. A situation in which human failure could lead to a compromise of encrypted data
b. A situation in which human failure could lead to a compromise of identification and authentication
c. A situation in which human failure could lead to a compromise of access control
Example answers: (a) Installing malware on a machine on which the data is decrypted; choosing too weak an encryption method. (b) Choosing weak passwords; choosing weak security questions. (c) Writing software that fails to properly enforce access control.

Computer Science & Information Technology

You might also like to view...

Based on what you know about e-commerce, how would you have tested a new Web-based system?

What will be an ideal response?

Computer Science & Information Technology

Suppose that ComputerA is trying to connect with another computer on the same network (ComputerB) with an IP address of 192.168.1.200. Describe what happens in making the connection.

What will be an ideal response?

Computer Science & Information Technology

To ensure that your questions don't vary between usability testers, it's considered a good practice to create a script and to use it consistently throughout the testing process.  _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

While not as detail-rich as vector images, bitmap graphic files are smaller and can be enlarged without losing image quality.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology