Humans are said to be the weakest link in any security system. Give an example for each of the following: (a) A situation in which human failure could lead to a compromise of encrypted data (b) A situation in which human failure could lead to a compromise of identification and authentication (c) A situation in which human failure could lead to a compromise of access control

What will be an ideal response?


Example
answers:
(a)
Installing
malware
on
a
machine
on
which
the
data
is
decrypted;
choosing
too
weak
an
encryption
method.
(b)
Choosing
weak
passwords;
choosing
weak
security
questions.
(c)
Writing
software
that
fails
to
properly
enforce
access
control.

Computer Science & Information Technology

You might also like to view...

The Photoshop ____ consists of the Menu bar at the top of the screen, the Tools panel on the left of the screen, and the dock of panels on the right of the screen.

A. workspace B. menu C. screenshot D. design window

Computer Science & Information Technology

Which of the following is the proper format for a 3-D reference?

A) Worksheet Name!RangeOfCells B) 'Worksheet Name!RangeOfCells' C) 'Worksheet Name'!RangeOfCells D) "Worksheet Name"!RangeOfCells

Computer Science & Information Technology

What are some of the advantages of using hosted cache mode over distributed cache mode?

A) A dedicated server is not needed B) Additional maintenance cost are saved C) Increased availability of cached files D) Support for multiple subnets

Computer Science & Information Technology

A drop cap is added to a paragraph as a(n) text object. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology