(i) Integrity and Authenticity.
The integrity and authenticity of information are threatened by modifying, removing, or misrepresenting existing data. For example, omitting sections of a bad credit history so that only the good credit history remains violate the integrity of the document, and requesting a cash advance using a stolen credit card violates the authenticity of that transaction.
(ii) Biometric controls.
Identification methods that use unique personal characteristics such as fingerprints, retinal patterns, skin oils, deoxyribonucleic acid (DNA), voice variations, and keyboard-typing rhythms to prove the identity of the user based on measurements of the user's unique attributes.
(iii) Encryption.
Refers to a technique used to protect confidentiality of information or data by sending it into a form unreadable by anyone except the intended recipient. Information can be scrambled and unscrambled using mathematical equations and a secret code called a key.
(iv) Approved Users.
Access-control software verifies computer users and limits their privileges to view and alter files. Records can be made of the files accessed thereby making users accountable for their actions.
(v) Use of Passwords.
Passwords are confidential sequences of characters that give approved users access to computers. To be effective, passwords must be difficult to guess. Effective passwords contain a mixture of characters and symbols that are not real words. To thwart imposters, computer systems usually limit the number of attempts to enter a correct password.
(vi) Firewalls.
This refers to the process of mixing (encoding/ encrypting) data in a form that only the sender and the receiver understands.
(vii) Security Servers.
Special computers called security servers provide secure connections between networked computers and outside systems, such as database-storage and printing facilities. These security computers use encryption in the handshaking process ( the initiation of the electronic exchange), which prevents a connection between two computers unless the identity of each is confirmed to the other.
maurice.mutuku answered the question on May 5, 2018 at 06:26
- Give examples of digital evidence (Solved)
Give examples of digital evidence
Date posted: May 4, 2018. Answers (1)
- State the user requirements in distributed system (Solved)
State the user requirements in distributed system.
Date posted: May 4, 2018. Answers (1)
- Mention some of the Problems associated with distributed system(Solved)
Mention some of the Problems associated with distributed system.
Date posted: May 4, 2018. Answers (1)
- Outline some of the reasons for building distributed system(Solved)
Outline some of the reasons for building distributed system.
Date posted: May 4, 2018. Answers (1)
- What can a firewall do? (Solved)
What can a firewall do?
Date posted: May 4, 2018. Answers (1)
- Types of firewall(Solved)
Types of firewall
Date posted: May 4, 2018. Answers (1)
- Characteristics of a distributed system(Solved)
Characteristics of a distributed system
Date posted: May 4, 2018. Answers (1)
- Examples of a distributed system(Solved)
Examples of a distributed system
Date posted: May 4, 2018. Answers (1)
- Features of distributed system(Solved)
Features of distributed system
Date posted: May 4, 2018. Answers (1)
- The features of a centralized system that separate them from distributed system(Solved)
The features of a centralized system that separate them from distributed system
Date posted: May 4, 2018. Answers (1)
- What is Distributed system?(Solved)
What is Distributed system?
Date posted: May 4, 2018. Answers (1)
- What is the difference between Simplex and Duplex?(Solved)
Give the differences between Simplex and Duplex.
Date posted: May 4, 2018. Answers (1)
- What is the difference between Attenuation and Broadcast?(Solved)
Distinguish between Attenuation and Broadcast.
Date posted: May 4, 2018. Answers (1)
- What is the difference between Bandwidth and Protocol?(Solved)
Differentiate between Bandwidth and Protocol.
Date posted: May 4, 2018. Answers (1)
- What is the difference between Data Terminal Equipment (DTE) and Data Circuit-Terminating Equipment (DCE) components of a computer network?(Solved)
Differentiate between Data Terminal Equipment (DTE) and Data Circuit-Terminating Equipment (DCE) components of a computer network.
Date posted: May 4, 2018. Answers (1)
- What are the factors to consider when choosing the appropriate physical network topology?(Solved)
You have been approached by your organization as an IT expert to assist in the development of a computer network within your department. Briefly explain the factors to consider when choosing the appropriate physical network topology.
Date posted: May 4, 2018. Answers (1)
- What is the most appropriate physical network topology likely to be used between three employees working in the same department and the number does not...(Solved)
Explain the most appropriate physical network topology likely to be used between three employees working in the same department and this number does not intend to increase in the near future.
Date posted: May 4, 2018. Answers (1)
- What is the most appropriate physical network topology likely to be used between ten employees working in the same department and their boss?(Solved)
Explain the most appropriate physical network topology which is likely to be used between ten employees who work in the same department and their boss.
Date posted: May 4, 2018. Answers (1)
- What is the most appropriate physical network topology likely to be used between ten employees working in the same department?(Solved)
Briefly explain the most appropriate physical topology which you are likely to use between ten employees who work in the same department.
Date posted: May 4, 2018. Answers (1)
- What is the difference between logical and physical topology?(Solved)
Differentiate between logical and physical topology.
Date posted: May 4, 2018. Answers (1)