What are the four processes encompassed by access control?

What will be an ideal response?

Identification-obtaining the identity of the entity requesting access to a logical or physical area
Authentication-confirming the identity of the entity seeking access to a logical or physical area
Authorization-determining which actions that entity can perform in that physical or logical area
Accountability-documenting the activities of the authorized individual and systems

Computer Science & Information Technology

You might also like to view...

Why is a splitter used with DSL?

What will be an ideal response?

Computer Science & Information Technology

An object's methods and attributes are accessed by writing the name of the object followed by the ________.

a) method name/attribute name b) method/attribute index c) dot operator d) property operator

Computer Science & Information Technology