1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bixtya [17]
2 years ago
9

What are the four components of security documentation?

Computers and Technology
1 answer:
Minchanka [31]2 years ago
4 0

Answer:

it is known as the IAAA

Explanation:

Identification, authentication, authorization, accounting.

Identification

Identification creates an account or ID that identifies the user, device, or process on the network. This process is used to verify a legitimate user. In some cases, this is where the billing and delivery addresses must match to prevent fraudulent payment methods.

Authentication

Authentication validates a user's identity by asking for specific information, such as a unique username and password or a fingerprint. This is the first major step in access control and must be met before the user goes any farther.

Authorization

Authorization allows users to perform certain actions like accessing, editing, and saving files. Authentication allows users into a system where they can access files and make changes. The authorization process determines where the user has the right to go within a network. Types of users might include administrators, power users, and standard users. Administrators, or "admins," run the show. They decide who can access resources on the network. Power users are typically employees who tend to have a lot of access to features and information. Standard users are usually business partners or vendors whose access is limited to files and information specifically shared with them.

Accounting

Accounting measures the overall access of users by tracking the amount of information they access, the resources they consume, and the number of hours they spend on a session. Everyone's actions are visible on a network. This holds users accountable for their actions. If something goes wrong or sensitive data is leaked, management and administration can track the issue to specific users and timeframes.

Brainleist please! :)

You might be interested in
Which media device uses the characteristic continuous?
notka56 [123]
The media device that uses characteristics continuous is the Screen.
In Continous characteristic 
is where there is timing relationship between source and destination.
4 0
3 years ago
Which of the following is a career that's indirectly linked to careers in web technologies?
leva [86]

Answer:

that would beA

Explanation:

7 0
4 years ago
What is the name for the last word on a dictionary page?
kakasveta [241]

Answer:

bbbbbbbbbbbbbbbbbbbbbbbb

Explanation:

bbbbbbbbbbbbbbbbbbbbbbbbb

8 0
3 years ago
Choose the 3 Points in good story telling
Sidana [21]

Answer:

1.Choose a clear central message 2. Embrace conflict 3.Have a clear structure  

Explanation:

8 0
2 years ago
Select the correct answer.
bagirrra123 [75]

Answer:

I think the answer is C

Explanation:

Because if you use context clues for the word CINEMATOGRAPHER, cinema is like scene and lights and tographer is the person who adjusts it

4 0
3 years ago
Other questions:
  • Create a class called Animal that accepts two numbers as inputs and assigns them respectively to two instance variables: arms an
    11·1 answer
  • What is data anayltics
    5·1 answer
  • A(n) _____ can be used to reveal a competitor’s program code, which can then be used to develop a new program that either duplic
    9·1 answer
  • You will write a program that generates random drawings that can be drawn using the shape painter.
    5·1 answer
  • The following processes are being scheduled using a preemptive, round-robin scheduling algorithm. Each process is assigned a num
    6·1 answer
  • When you use the tilde operator (~ in a url for the attribute of a server control, it represents the _____ directory of the webs
    5·1 answer
  • What are the tyoe of typical application of mainframe computer<br>​
    6·1 answer
  • You are tasked with designing an airplane that could carry a very large load of cargo. What type of airfoil would you use for th
    13·1 answer
  • What is computer system ?​
    9·2 answers
  • 3. Coaxial/telephone cable sends<br> during the data transmission<br> signal
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!