What are some other fields or areas that are combined with security technology when providing a security solution?

What will be an ideal response?


Providing a security solution is not solely dependent on technologies, as it combines the following:
* Policy and law, such as federal legislation and policies requiring use of a single user ID
* Business processes and practices, such as selecting identity-related practices and processes based on costs, benefits, and risks
* Technologies, such as using public key infrastructure, standard-based architecture, and vendor-specific implementation
* Public philosophies and principles, such as "everyone must be fingerprinted when entering a city," "safety is the first priority," or "identity is the power to control and invades privacy"

Computer Science & Information Technology

You might also like to view...

What are the advantages of using Dreamweaver over hand-coding?

What will be an ideal response?

Computer Science & Information Technology

________ is the standard language for describing and delivering data on the Web

Fill in the blank(s) with correct word

Computer Science & Information Technology

What functions might be provided by a SOHO router besides the normal duty of routing packets between networks? (Choose all that apply).

A. directory server B. firewall C. wireless access point D. Email server

Computer Science & Information Technology

Credential roaming is configured as a ____, which enables it to be automatically applied to client computers running Windows operating systems such as Windows Vista and 7.

A. script B. group policy C. network policy D. template

Computer Science & Information Technology