Briefly describe the two steps related to physical security.

What will be an ideal response?


Physical security is a two-step process:
•       First, prevent and control access to IT resources to appropriate personnel.
•       Second, track the actions of those authorized (and sometimes unauthorized) personnel.
 

Computer Science & Information Technology

You might also like to view...

Personnel security is meant to address ____________________ threats.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following statements is true about this line?

Consider the following line of code. ``` Comparable s = new String(); ``` a) It will result in a compile-time error. b) It will result in a run-time error. c) It will create a String object pointed to by a Comparable reference. d) Although it is perfectly valid Java, it should be avoided due to confusion. e) none of the above are true

Computer Science & Information Technology

Consider a class PersonAddress that represents an entry in an address book. Its attributes are

• The first name of the person • The last name of the person • The e-mail address of the person • The telephone number of the person It will have methods to • Access each attribute • Change the e-mail address • Change the telephone number • Test whether two instances are equal based solely on name a. Write a method heading for each method. b. Write preconditions and postconditions for each method. c. Write some Java statements that test the class. d. Implement the class.

Computer Science & Information Technology

?One of the main activities in the systems analysis phase is _____, which involves fact-finding to describe the current system and identification of the specifications for the new system.

A. ?objective modeling B. ?requirements modeling C. ?goal-based modeling D. ?user-based modeling

Computer Science & Information Technology