1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stira [4]
4 years ago
6

An access control system that grants users only those rights necessary for them to perform their work is operating on which secu

rity principle?
A. Discretionary Access
B. Least Privilege
C. Mandatory Access
Computers and Technology
1 answer:
solmaris [256]4 years ago
7 0

Answer:

B. Least privilege                

Explanation:

  • The principle of least privilege an important principle in computer security.
  • It limits the access rights for users and only grant them with the rights that are sufficient for them to perform their required task.
  • For example a user is granted privilege to execute a file or manipulate data or use only the resources that are required for them to perform a particular task.
  • This principle can be used only to limit and control access rights to system resources and applications.
  • The least privilege is beneficial as it reduces the risk of unauthorized access.
  • For example a user whose task is data entry and has nothing to do with controlling access or granting access rights to users, will only be allowed to enter data to the DB by the principle of least privilege.
You might be interested in
What is the most consistent item regardless of the software used in BI?
vodomira [7]

Answer Explanation:

Business intelligence is defined as the strategies and technologies used by companies for the data analysis of business information it tell us also about predictive views of business operation.

THE MOST CONSISTENT ITEMS REGARDLESS OF SOFTWARE USED IN BI ARE :

  • data analyst has the most responsibility of BI he is the most important part of BI
  • It is the interconnected process of inspection changing and modeling
  • data analysis is hugely aided by data mining
5 0
3 years ago
When an item in a menu is black, it means that _____.
Lunna [17]
You cannot select it because it is either not able to be done at the time or there was an error.
3 0
4 years ago
Read 2 more answers
The protection of intellectual property (ip) is an example of what kind of information security need?
timama [110]

The protection of intellectual property (IP) is an example of Confidentiality of information security need, Unauthorized disclosure of intellectual property might result in the loss of whatever competitive advantage the IP may have provided the company.

What is considered IP?

Any creation of human intelligence that is shielded by the law from illegal use by others is generally referred to as intellectual property. A limited monopoly over protected property is inevitably created by the ownership of intellectual property.

Who owns intellectual property?

A work's owner is typically considered to be its creator. But for various kinds of property and in various situations, intellectual property ownership can be decided in various ways. For instance, if a piece of work is produced for a client, the client is the owner of that intellectual property.

Learn more about intellectual property: brainly.com/question/18650136

#SPJ4

3 0
2 years ago
For developing a mis in your business organization, you intend to launch a new is department or team. how the is function will s
sergiy2304 [10]

The   function will support my business because it will help in decision making.

<h3>What is the importance of  Management Information System?</h3>

Management Information System can be described as the collection of Organized data  that can help the organization  in decision making.

Making a good decision , it will help the company to compete excellently with great profit.

Learn more about Management Information System on:

brainly.com/question/11768396

#SPJ1

6 0
2 years ago
The maximum weight the box can possibly hold is 49 ounces. The scale at the checkout counter will weigh the box and calculate th
yuradex [85]

Answer:

A practical example is this definition of the square of a number, intended to be a function predicate: square(X,Y) :- Y is X * X.

Explanation:

6 0
3 years ago
Other questions:
  • Which of the following courses would an aspiring film composer most likely take?
    12·2 answers
  • One of the earlier applications of crypto-graphic hash functions was the storage of passwords to authenticate usersin computer s
    13·1 answer
  • Trailer nodes at the end of the list should contain avalue ____ than the largest value in the dataset.
    8·1 answer
  • The ____ search feature allows you to look for words with extensions such as “ing,”“ed,” and so forth. .
    12·1 answer
  • You can add envelopes to existing documents. <br> a. True <br> b. False
    10·1 answer
  • How is an orthographic drawing similar or different from an isometric drawing
    12·1 answer
  • Where can you make changes to AutoCorrect?
    14·2 answers
  • PLEASE HURRY!!<br> Look at the image below
    14·1 answer
  • In cell B20, enter a
    14·1 answer
  • HELP ME PASS!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!