What are the four processes encompassed by access control?
What will be an ideal response?
Identification-obtaining the identity of the entity requesting access to a logical or physical area
Authentication-confirming the identity of the entity seeking access to a logical or physical area
Authorization-determining which actions that entity can perform in that physical or logical area
Accountability-documenting the activities of the authorized individual and systems
Computer Science & Information Technology
You might also like to view...
Why is a splitter used with DSL?
What will be an ideal response?
Computer Science & Information Technology
An object's methods and attributes are accessed by writing the name of the object followed by the ________.
a) method name/attribute name b) method/attribute index c) dot operator d) property operator
Computer Science & Information Technology