Discuss the difficulties in defending systems when dealing with user confusion.
What will be an ideal response?
Increasingly, users are called upon to make difficult security decisions regarding their computer systems, sometimes with little or no information to direct them. It is not uncommon for a user to be asked security questions such as Do you want to view only the content that was delivered securely? or Is it safe to quarantine this attachment? or Do you want to install this extension? With little or no direction, users are inclined to provide answers to questions without understanding the security risks. In addition, popular information that is circulated about security through consumer news outlets or websites is often inaccurate or misleading, resulting in even more user confusion.
You might also like to view...
Varibles that are declared inside a function are said to be _________ to that function.
Fill in the blank(s) with the appropriate word(s).
____ is the universal coding scheme for characters.
A. EBCDIC B. ANSI C. ASCII D. Unicode
You can specify the location of each color by adding ____________________ to the linear-gradient() function.
Fill in the blank(s) with the appropriate word(s).
________ programs allow you to mix text and graphics to create publications of professional quality.
A. Desktop publishing B. Presentation C. Spreadsheet D. Word processing