Protecting Your Identity

Ace your homework & exams now with Quizwiz!

How should the things that establish personal identity (passwords, access tokens, etc.) be protected?

All of the above

In the context of a computer system, what do "access controls" do?

Control what a particular person is authorized to do, after gaining access to a computer system.

Which of these is correct about physical security?

It is as important as ever, because controlling physical access to electronic and non-electronic (paper) systems is always critical.

Which of these is correct about identity theft?

Protection of workplace identity requires protecting the things that establish identity -- what one knows, what one possesses, and what one "is" (biometrically).

In the context of a computer system, what does an "audit trail" do?

Record activity on a computer system

What is the most common way for human beings to authenticate a person's "identity" in daily human life?

Something a person "is," like the way he/she looks or speaks.

What is the most common way for computing systems and devices to authenticate a person's identity?

Something a person knows, like a password or PIN.


Related study sets

ABA Learning Objectives Chp.21, 22, and 23

View Set

Forms + HW's Review (Igneous Rocks)

View Set

Unit #1 - Regulation of Investment Advisers, Including State-Registered and Federal Covered Advisers

View Set