Protecting Your Identity

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

How should the things that establish personal identity (passwords, access tokens, etc.) be protected?

All of the above

In the context of a computer system, what do "access controls" do?

Control what a particular person is authorized to do, after gaining access to a computer system.

Which of these is correct about physical security?

It is as important as ever, because controlling physical access to electronic and non-electronic (paper) systems is always critical.

Which of these is correct about identity theft?

Protection of workplace identity requires protecting the things that establish identity -- what one knows, what one possesses, and what one "is" (biometrically).

In the context of a computer system, what does an "audit trail" do?

Record activity on a computer system

What is the most common way for human beings to authenticate a person's "identity" in daily human life?

Something a person "is," like the way he/she looks or speaks.

What is the most common way for computing systems and devices to authenticate a person's identity?

Something a person knows, like a password or PIN.


Kaugnay na mga set ng pag-aaral

ABA Learning Objectives Chp.21, 22, and 23

View Set

Forms + HW's Review (Igneous Rocks)

View Set

Unit #1 - Regulation of Investment Advisers, Including State-Registered and Federal Covered Advisers

View Set