Protecting Your Identity

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

How should the things that establish personal identity (passwords, access tokens, etc.) be protected?

All of the above

In the context of a computer system, what do "access controls" do?

Control what a particular person is authorized to do, after gaining access to a computer system.

Which of these is correct about physical security?

It is as important as ever, because controlling physical access to electronic and non-electronic (paper) systems is always critical.

Which of these is correct about identity theft?

Protection of workplace identity requires protecting the things that establish identity -- what one knows, what one possesses, and what one "is" (biometrically).

In the context of a computer system, what does an "audit trail" do?

Record activity on a computer system

What is the most common way for human beings to authenticate a person's "identity" in daily human life?

Something a person "is," like the way he/she looks or speaks.

What is the most common way for computing systems and devices to authenticate a person's identity?

Something a person knows, like a password or PIN.


Ensembles d'études connexes

Forms + HW's Review (Igneous Rocks)

View Set

Unit #1 - Regulation of Investment Advisers, Including State-Registered and Federal Covered Advisers

View Set

Week 16 - Palliative Care & End of Life

View Set