What are the benefits of limiting access to information?

What will be an ideal response?


Limiting access to information reduces the threat against it. Only those who must use data should have access to it. In addition, the amount of access granted to someone should be limited to what that person needs to know. For example, access to the management features of access points should be limited to approved technicians and security personnel. An office worker may be using the wireless LAN provided by the access point, but he should not be able to view or configure the AP settings because he has no job-related need to do so.

Computer Science & Information Technology

You might also like to view...

The code for implementing the String pop() operation is

A stack based on a linked list is based on the following code ``` class Node { String element; Node next; Node(String el, Node n) { element = el; next = n; } } Node top = null; ``` A) if (top != null) { top = top.next; String el = top.element; return el; } else throw new RuntimeException("Empty Stack"); B) if (top != null) { String el = top.element; top = top.next; return el; } else throw new RuntimeException("Empty Stack"); C) if (top != null) { String el = top.element; top = null; return el; } else throw new RuntimeException("Empty Stack"); D) return top.element; top = top.next;

Computer Science & Information Technology

A ____ is any Outlook item such as a task, an email message, or a contact that has been flagged for follow-up later.

A. task cluster B. to-do list C. to-do item D. category

Computer Science & Information Technology

PowerPoint lets you insert pictures in many file formats, including JPEG, PNG, GIF, TIFF, and BMP.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Use a counter or a(n) ____ to control a loop's repetitions.

A. sentinel variable  B. end value C. sentinel value D. end statement

Computer Science & Information Technology