1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bixtya [17]
2 years ago
9

What are the four components of security documentation?

Computers and Technology
1 answer:
Minchanka [31]2 years ago
4 0

Answer:

it is known as the IAAA

Explanation:

Identification, authentication, authorization, accounting.

Identification

Identification creates an account or ID that identifies the user, device, or process on the network. This process is used to verify a legitimate user. In some cases, this is where the billing and delivery addresses must match to prevent fraudulent payment methods.

Authentication

Authentication validates a user's identity by asking for specific information, such as a unique username and password or a fingerprint. This is the first major step in access control and must be met before the user goes any farther.

Authorization

Authorization allows users to perform certain actions like accessing, editing, and saving files. Authentication allows users into a system where they can access files and make changes. The authorization process determines where the user has the right to go within a network. Types of users might include administrators, power users, and standard users. Administrators, or "admins," run the show. They decide who can access resources on the network. Power users are typically employees who tend to have a lot of access to features and information. Standard users are usually business partners or vendors whose access is limited to files and information specifically shared with them.

Accounting

Accounting measures the overall access of users by tracking the amount of information they access, the resources they consume, and the number of hours they spend on a session. Everyone's actions are visible on a network. This holds users accountable for their actions. If something goes wrong or sensitive data is leaked, management and administration can track the issue to specific users and timeframes.

Brainleist please! :)

You might be interested in
comparing the cost of care provided to medicare beneficiaries assigned to primary care nurse practitioners and physicians
Aleks [24]

"Comparing the cost of care provided to Medicare beneficiaries assigned to primary care nurse practitioners and physicians" is a study that

<h3>What is the cost of Medicare according to the above study?</h3>

The study shows that after controlling for demographics, geography, comorbidities, and proclivity to visit an NP, Medicare evaluation and management payments for patients allocated to an NP were $207, or 29%, less than PCMD assigned beneficiaries.

The similar tendency was seen for inpatient and total office visit payment amounts, with NP-assigned beneficiaries receiving 11 and 18 percent less, respectively. The work component of relative value units yields similar results.

Learn more about Medicare:
brainly.com/question/1960701
#SPJ4

8 0
2 years ago
Bakit mahalaga na marunong tayong gumamit ng makina?
jeka94

Answer:

para mabilis ang gawa

Explanation:

hope it helps

5 0
3 years ago
What is a primary feature of a digital video camera?
masha68 [24]
The primary feature of a digital video camera is to records video as digital signals. A digital video camera picture out as of live settings, encrypting it into information that can be definite or transcoded into electronic photographic media. A typical digital camera contains of a lens, image sensor, storing media and a number of other characteristics that can be also be initiated on other cameras such as scalable aperture, filters and flash. High feature images and digital video slides can be put in storage and replicated on a computer, CD or writable DVD or on the internet in deprived of any loss of quality.
4 0
4 years ago
How do you add a comment box to a multiple choice question in survey monkey?
Sunny_sXe [5.5K]

Answer:

(Hope this helps can I pls have brainlist (crown) ☺️)

Explanation:

1.Drag and drop Comment Box into your survey from the BUILDER section.

2.Enter question text.

3.Configure any additional options.

4.Click Save.

4 0
3 years ago
Which of the following is a variable expense for many adults?
IRINA_888 [86]
<span>C. Their monthly rent payment.</span>
7 0
3 years ago
Read 2 more answers
Other questions:
  • If you are interested in joining the military, you can attend college _____. a. before serving b. during service c. after servic
    11·1 answer
  • Consider a binary-search method in an array that reports whether an object is in the array. The documentation indicates that the
    11·1 answer
  • Write an if/else statement that assigns 0 to x when y is equal to 10; otherwise it should assign
    9·1 answer
  • The first computer program was used to help the analytical engine calculate numbers. Who invented that program?
    6·1 answer
  • Ok so this question is kinda weird but does anyone know what google drive is. If so how do you upload a video to it?
    11·2 answers
  • What is HTML? (list down any 5 points)
    12·1 answer
  • To convert microseconds to nanoseconds: a. Take the reciprocal of the number of microseconds. b. Multiply the number of microsec
    13·1 answer
  • Which of the following is not a method for opening Word software?
    14·2 answers
  • The variable points stores data that the user has input. what is the data type of this variable?
    12·1 answer
  • which two statements about incoming and outgoing interfaces in firewall policies are true? (choose two.)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!