Match each term with the correct statement below.

A. Limits any damage that might occur from an intrusion or violation
B. Establishes that the subject is trusted
C. Ensures that all intrusions and violations are detected
D. Ensures that the subject is assigned appropriate access privileges
E. Ensures restoration of the data to a prior state in case of disaster
F. Establishes that subjects are who they say they are
G. Ensures that all requisite measures are in place to prevent harm
H. Ensures that access privileges are monitored and enforced
I. Ensures that all intrusions and violations are punished

A. Containment
B. Identification
C. Detection
D. Authorization
E. Recovery
F. Authentication
G. Prevention
H. Accountability
I. Deterrence

Computer Science & Information Technology

You might also like to view...

A controlled substance is a drug or substance regulated by the government

Indicate whether the statement is true or false

Computer Science & Information Technology

Pseudocode commands:

a. Are always capitalized b. Never use the assignment statement. c. Use variable names with embedded blank spaces. d. Do not end. e. None of the above.

Computer Science & Information Technology