Which of the following need to be taken into consideration during the system security planning process?

A. how users are authenticated
B. the categories of users of the system
C. what access the system has to information stored on other hosts
D. all of the above

D

Business

You might also like to view...

Task lighting helps conserve energy

Indicate whether the statement is true or false.

Business

Explain, briefly, why, in the exponential smoothing forecasting method, the larger the value of the smoothing constant, ?, the better the forecast will be in allowing the user to see rapid changes in the variable of interest

What will be an ideal response?

Business