1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bixtya [17]
2 years ago
9

What are the four components of security documentation?

Computers and Technology
1 answer:
Minchanka [31]2 years ago
4 0

Answer:

it is known as the IAAA

Explanation:

Identification, authentication, authorization, accounting.

Identification

Identification creates an account or ID that identifies the user, device, or process on the network. This process is used to verify a legitimate user. In some cases, this is where the billing and delivery addresses must match to prevent fraudulent payment methods.

Authentication

Authentication validates a user's identity by asking for specific information, such as a unique username and password or a fingerprint. This is the first major step in access control and must be met before the user goes any farther.

Authorization

Authorization allows users to perform certain actions like accessing, editing, and saving files. Authentication allows users into a system where they can access files and make changes. The authorization process determines where the user has the right to go within a network. Types of users might include administrators, power users, and standard users. Administrators, or "admins," run the show. They decide who can access resources on the network. Power users are typically employees who tend to have a lot of access to features and information. Standard users are usually business partners or vendors whose access is limited to files and information specifically shared with them.

Accounting

Accounting measures the overall access of users by tracking the amount of information they access, the resources they consume, and the number of hours they spend on a session. Everyone's actions are visible on a network. This holds users accountable for their actions. If something goes wrong or sensitive data is leaked, management and administration can track the issue to specific users and timeframes.

Brainleist please! :)

You might be interested in
What directs the read/write arm of the hard drive to where data exists and accesses it upon the user's request?
Nastasia [14]

Answer:

NTFS (New Technology File System) or FAT(File Allocation Table) are used to direct read/write arm of hard drive to where data exists and access it upon user's request

Explanation:

Both NTFS and FAT are used but NTFS is fast and optimal and superseed the FAT and supported by windows NT 3.1 and later versions.  

7 0
3 years ago
What Are some examples of options you can use for bullets? Check all that apply
murzikaleks [220]
Please show the answer options for this problem as otherwise we will be unable to help you.
7 0
4 years ago
Which component, located on the motherboard, carries out all the instructions provided by computer programs? ram?
Blababa [14]
<span>The Chipset is the component located on the motherboard, this carries out all the instructions provided by computer programs. It is the integrated circuit that manages all the data flow between processor and memory. It usually works with microprocessors and plays a crucial role in determining system performance.</span>
6 0
3 years ago
Communication competence is _____.
posledela
Communication competence is the ability to interact with others in a manner that is honest and appropriate for the situation, individuals, and task.
5 0
3 years ago
How does the actual amount left to spend differ from the budgeted amount for the remaining three months of the project?
Vlad [161]

Answer:

The left(in actual) can be more or less than the budgeted for the remaining time. Suppose some resource fell ill or got damaged, you are going to invest in them, and get them back. However, for that, you need to spend money, and this reduces the actual left, as more of the budgeted is being spent. And this is the difference between the two, the actual left to spend from the budgeted for the remaining time of the project. However, the project managers keep an extra budget these days for such a situation, and hence this drawback in the project plan has already been removed, and the problem is solved.

Explanation:

Please check the answer.

The overexpense %

= (( Actual spent - Budgeted amount)/Budgeted amount) *100

3 0
3 years ago
Other questions:
  • An effective password can help prevent
    11·2 answers
  • Jen wants to protect the schools network from hackers,worms,and viruses.she also wants to regulate access to certain websites th
    15·2 answers
  • State three differences between a hard drive and a pen drive​
    6·1 answer
  • List and describe four communication tools that are currently popular.
    9·1 answer
  • Which of the following extends a network over a large geographic area by connecting local area networks together?
    14·2 answers
  • Which is a common problem for inserting pictures into placeholders?
    10·1 answer
  • Let X and Y be two decision problems. Suppose we know that X reduces to Yin polynomial time. Which of the following statements a
    14·1 answer
  • Examples of the many different ways an app can be used are called use
    6·2 answers
  • How goes design again ones attention?
    6·1 answer
  • How would our lives be different without computers at home?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!