The Computer Security Act charges the National Bureau of Standards, in cooperation with the National Security Agency (NSA), with the development of five standards and guidelines establishing minimum acceptable security practices. What are three of these principles?
What will be an ideal response?
Standards, guidelines, and associated methods and techniques for computer systemsUniform standards and guidelines for most federal computer systemsTechnical, management, physical, and administrative standards and guidelines for the cost-effective security and privacy of sensitive information in federal computer systemsGuidelines for use by operators of federal computer systems that contain sensitive informationin training their employees in security awareness and accepted security practiceValidation procedures for, and evaluation of the effectiveness of, standards and guidelinesthrough research and liaison with other government and private agencies
You might also like to view...
Define what is meant by scaling.
What will be an ideal response?
Define the following security terms.
a) digital signature b) hash function c) symmetric key encryption d) digital certificate e) Denial of Service attack f) worm g) message digest h) collision i) triple DES j) session keys
An Input Area (as it applies to Excel 2010 ) is defined as
A) a range of cells containing values for variables used in formulas. B) displays the name of a worksheet within a workbook. C) displays the content of the active cell. D) a range of cells containing results based on the output area.
Each SharePoint site is a collection of pages managed by a Document library
Indicate whether the statement is true or false