1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
11

What are the three fundamental elements of an effective security program for information systems?

Computers and Technology
2 answers:
MArishka [77]3 years ago
6 0
Authentication, Authorization and Identification.

Authentication - It is a process of how one proves or determines whether they are who they declare to be or who they say they are. Logically, authorization on the hand can be used synonymously with Authentication but are two different processes. Authorization occurs when one has been identified and authenticated. Identification is simply claiming that you are somebody. In the IS world, identification is analogous to entering a username and not analogous to entering a password.
marishachu [46]3 years ago
4 0
<span>the three fundamental elements of an effective security program for information systems are Identification, Authentication and Authorization.The access control creates the user and assigns the rights to resources and authorization is giving permissions to the users to access the resources.The user who wants to enter the system should have a valid data t enter the system like password, fingerprint or any other type of recognition.</span>
You might be interested in
Sets of rules that a computer uses to solve problems?
jonny [76]

Protocal

I need to make this 20 charaters so ye

8 0
3 years ago
Read 2 more answers
A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which bene
a_sh-v [17]

Answer:

Redundant paths can be available without causing logical Layer 2 loops.

Explanation:

  • Spanning Tree Protocol is used to allow redundancy in the Layer 2 switched networks without creating cycles/circles also called loops.
  • These loops are called physical loops.
  • When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.
  • This affects the performance of the network as the result of broadcast packets flooding.
  • STP puts one port of the switch to forward mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to block mode and the one port that is left after this is placed in forward mode.
  • Spanning Tree Algorithm is used by STP to determine the optimal path  of switch to the network.
  • Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.
  • This information helps STP to eliminate the redundant paths.
  • So this is how STP tracks all the links in the switched network and eliminates redundant loops by allowing only one active path to the destination while blocking all other paths.
7 0
3 years ago
Match the description to the step in troubleshooting.
Digiron [165]
It should go 4 5 3 2 1
5 0
3 years ago
You can specify a column width of 0 to ____________.
Sergeeva-Olga [200]

Answer:

255

hope this helps! ^^

4 0
3 years ago
Read 2 more answers
What is the best definition of inflation?
MakcuM [25]
I mean there’s 2 definitions for it

Inflation is a situation of rising prices in the economy. A more exact definition of inflation is a sustained increase in the general price level in an economy. Inflation means an increase in the cost of living as the price of goods and services rise.


Or inflation can be growing the size (blowing up a balloon)
5 0
3 years ago
Other questions:
  • What operating system type uses icons to represent programs
    9·2 answers
  • A typeface in which each character has the same width and is often used to display programming code is _
    8·1 answer
  • The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is
    5·2 answers
  • Why was the first computer developed? a.) for personal use, b.) for military purposes, c.) for transportation, d.) for communica
    5·1 answer
  • Which of the following is the primary medium for beach erosion?
    12·1 answer
  • . Which of the following are container elements?
    14·2 answers
  • If you said the bottom margin, you are talking about what?
    13·2 answers
  • Examples of email prividers​
    6·2 answers
  • Why is it easier to spot a syntax error than a logical error?​
    10·2 answers
  • State the difference between font colour and shading.​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!