Define the terms “physical,” “logical,” and “behavioral security,” and give an example of each one that illustrates the differences among them.
What will be an ideal response?
Physical security is controlling access to physical computer resources.
Example: Chaining a computer to a table in the information center.
Logical security is controlling software access.
Example: A user I D and password when logging on to Windows X P or the network.
Behavioral security is building procedures to prevent persons from misusing computer hardware and software.
Example: A log of unsuccessful attempts to sign on to the computer.
You might also like to view...
When you click ________, a Microsoft Excel information box displays indicating that this will permanently remove the query definition from the sheet and convert the table to a normal range
A) Convert to Table B) Convert to Style C) Convert to Data D) Convert to Range
What is the general purpose in defining responsibilities of those affiliated with the project?
What will be an ideal response?