Describe the balance between information security and access.
What will be an ideal response?
Information security must balance protection of information and information assets with the availability of that information to its authorized users. It is possible to permit access to a system so that it is available to anyone, anywhere, anytime, through any means-that is, maximum availability. However, this poses a danger to both the confidentiality and the integrity of the information. On the other hand, to achieve the maximum confidentiality and integrity found in a completely secure information system would require that the system not allow access to anyone.
You might also like to view...
What is the default execution time for PHP scripts?
a. 60 seconds b. 90 seconds c. 30 seconds d. 120 seconds
The sentinel node points to the first data node and the last data node.
Answer the following statement true (T) or false (F)
Which topology defines the way in which devices communicate and data is transmitted throughout the network?
a. Physical. b. Logical. c. Hybrid. d. Star.
You cannot delete a row from a view.
Answer the following statement true (T) or false (F)