Answer:
a.This helps with non-repudiation to ensure the user is who they claim to be and that they are authorized to access confidential organizational assets.
Explanation:
Answer:
c is the correct awnser ( to code and test )
Answer:
True
Explanation:
Computer security is basically divided into three main areas:
- Vulnerability/threat assessment and risk management refers to a process that requires the identification, quantification and ranking of a system's possible vulnerabilities.
- network intrusion detection and incident response refers to software that detects malicious activity or policy violations, and blocks them
- digital forensic investigation refers to the process of identifying, recovering and interpreting (or validating) electronic data.
Generally a single individual may specialize in one of these areas, that is why he/she may need help with the others.