Protecting Your Identity
How should the things that establish personal identity (passwords, access tokens, etc.) be protected?
All of the above
In the context of a computer system, what do "access controls" do?
Control what a particular person is authorized to do, after gaining access to a computer system.
Which of these is correct about physical security?
It is as important as ever, because controlling physical access to electronic and non-electronic (paper) systems is always critical.
Which of these is correct about identity theft?
Protection of workplace identity requires protecting the things that establish identity -- what one knows, what one possesses, and what one "is" (biometrically).
In the context of a computer system, what does an "audit trail" do?
Record activity on a computer system
What is the most common way for human beings to authenticate a person's "identity" in daily human life?
Something a person "is," like the way he/she looks or speaks.
What is the most common way for computing systems and devices to authenticate a person's identity?
Something a person knows, like a password or PIN.