1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
victus00 [196]
3 years ago
13

Mecanismo que permite conocer si la persona que esta ingresando a un sistema es realmente quien deba y no un intruso

Computers and Technology
1 answer:
Tems11 [23]3 years ago
4 0

Answer:

Sistemas de autenticación y seguridad de la información.

Explicación:

La seguridad de la información es un mecanismo que permite saber si la persona que está ingresando a un sistema es realmente quien debería y no un intruso. La seguridad de la información básicamente ayuda a prevenir el acceso no autorizado y permite que la única persona autorizada ingrese al sistema. Los sistemas de autenticación son el mecanismo de seguridad que se utiliza para proteger los datos y los sistemas. Estos sistemas de autenticación también ayudan a garantizar que los usuarios sean la persona autorizada o no.

You might be interested in
Which of the following is not considered format?
GalinKa [24]
The answer is indeed the last one, ordering information and let me say it is true because this describes a function in itself and not a format like the first option that is a text format, the second a visual format and the third could be a table format. I hope this clarifies things
6 0
3 years ago
Read 2 more answers
Modify your main.c file so that it allocates a two dimensional array of integers so that the array has 20 rows of 30 integers in
Alexandra [31]

Answer:

Explanation:

b

7 0
3 years ago
How did larissa describe the process of roberto's release in chapter 4 and what was her answer to jonas question
Ksenya-84 [330]
What is the book and show page number?
8 0
3 years ago
What is cyber ethics​
RoseWind [281]

Answer:

cyber ethics​

Explanation:

code of responsible behavior on the Internet. Just as we are taught to act responsibly in everyday life with lessons such as "Don't take what doesn't belong to you" and "Do not harm others," we must act responsibly in the cyber world.

7 0
3 years ago
Read 2 more answers
How to save pictures on a chromebook without right-click
grin007 [14]

screen shot is easier

4 0
3 years ago
Other questions:
  • What is the most common threat on the internet? auction fraud illegal software computer viruses hackers?
    14·1 answer
  • Which practice represents the trait of effective communication?
    6·2 answers
  • Now suppose that the file is broken into 5 packets, each of 10 Mbits. Ignore headers that may be added to these packets. Also ig
    14·1 answer
  • Are high tech messages are always preferable to low tech messages
    8·1 answer
  • Which components can be added to a lightning app on custom object (choose 3 answers)A. Visualforce B. Standard Lightning compone
    6·1 answer
  • Write a flowchart and program that does the following: Asks the user for the average temperature in each of the last 12 months A
    12·1 answer
  • 1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disable
    6·1 answer
  • A presentation software that is used to organize and present pertinent information using graphics, word processing, outlining, d
    12·1 answer
  • WHAT IS THE LOCATION OF “A”. ON THE GRID?
    15·2 answers
  • What the advantages and disadvantages of file sharing to the users​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!