Describe four common mistakes that may occur when attempting to protect data that is at rest.

What will be an ideal response?


When attempting to protect data that's at rest, here are some common mistakes:
·      The application relies on a file system that does not have file permissions (e.g., FAT).
·      There are no data access controls, or the data access controls are weak.
·      Permissions to the data are not set properly (e.g., a user is given full read, write, and execute privileges when read-only would be sufficient).
·      The data is not encrypted, or the algorithm used to encrypt it is weak.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. Most things you can do in Scene Builder also can be accomplished in Java code. b. To create a custom ListView cell format, you must first define a sub-class of the ListCell that specifies how to create a ListView cell. c. As the ListView displays items, it gets ListView cells from its cell factory. d. You’ll use the ListView’s setCellFactory method to replace the default cell factory with one that returns objects of the ListCell sub-class. You override this class’s updateItem method to specify the cells’ custom layout and contents.

Computer Science & Information Technology

Progressively enhancing a web page for different viewing contexts (such as smartphones and tablets) through the use of coding techniques is called _________________________.

a. optimization b. responsive web design c. mobile web design d. fixed web design

Computer Science & Information Technology

To make the Dock visible, hover the mouse pointer over the bottom of the screen when it is hidden.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If you try to type in a cell, the text will appear behind the graphic.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology