Humans are said to be the weakest link in any security system. Give an example for each of the following: (a) A situation in which human failure could lead to a compromise of encrypted data (b) A situation in which human failure could lead to a compromise of identification and authentication (c) A situation in which human failure could lead to a compromise of access control
What will be an ideal response?
Example
answers:
(a)
Installing
malware
on
a
machine
on
which
the
data
is
decrypted;
choosing
too
weak
an
encryption
method.
(b)
Choosing
weak
passwords;
choosing
weak
security
questions.
(c)
Writing
software
that
fails
to
properly
enforce
access
control.
You might also like to view...
The Photoshop ____ consists of the Menu bar at the top of the screen, the Tools panel on the left of the screen, and the dock of panels on the right of the screen.
A. workspace B. menu C. screenshot D. design window
Which of the following is the proper format for a 3-D reference?
A) Worksheet Name!RangeOfCells B) 'Worksheet Name!RangeOfCells' C) 'Worksheet Name'!RangeOfCells D) "Worksheet Name"!RangeOfCells
What are some of the advantages of using hosted cache mode over distributed cache mode?
A) A dedicated server is not needed B) Additional maintenance cost are saved C) Increased availability of cached files D) Support for multiple subnets
A drop cap is added to a paragraph as a(n) text object. _________________________
Answer the following statement true (T) or false (F)