Humans are said to be the weakest link in any security system. Give an example for each of the following: (a) A situation in which human failure could lead to a compromise of encrypted data (b) A situation in which human failure could lead to a compromise of identification and authentication (c) A situation in which human failure could lead to a compromise of access control

What will be an ideal response?

Example
answers:
(a)
Installing
malware
on
a
machine
on
which
the
data
is
decrypted;
choosing
too
weak
an
encryption
method.
(b)
Choosing
weak
passwords;
choosing
weak
security
questions.
(c)
Writing
software
that
fails
to
properly
enforce
access
control.

Computer Science & Information Technology

You might also like to view...

Identify two examples of natural and surrogate keys in the property sales DM and discuss the benefits associated with using surrogate keys in general.

What will be an ideal response?

Computer Science & Information Technology

How many GEO satellites are needed to reach all populated areas on the earth?

What will be an ideal response?

Computer Science & Information Technology