Get premium membership and access questions with answers, video lessons as well as revision papers.
These controls are essential in protected data that is in transit through the Internet or intranets. The most common measures of protecting information in a network include: access control that includes authentication and passwords, encryption, cable testing and firewalls. Access controls safeguards against dial-in attempt. It authenticates the personal identification number assigned to every user and also user passwords. It can also include biometrics. Encryption encodes regular digitized text into unreadable scrabbled text or numbers to be decoded upon receipt. It accomplishes three purposes:
- Identifying legitimate senders and receivers
- Preventing changing any transaction or message
- Accomplishes privacy
Cable testing is popular in LANS and is used to find faults that can occur with LAN cabling. It can also include protocol analysis which allows users to inspect the contents of information packets as they travel through networks. Firewalls are groups of systems that enforce an access control policy between two networks. They are commonly used as a barrier between secure cooperate network or any other internal network and the Internet which is always assumed to be insecure. The firewall follows state guidelines that either permit or block traffic. It is designed with clear and specific rules about what can pass through.
Kavungya answered the question on May 10, 2019 at 13:21
- Describe the data security controls.(Solved)
Describe the data security controls.
Date posted: May 10, 2019. Answers (1)
- Describe the Access control.(Solved)
Describe the Access control.
Date posted: May 10, 2019. Answers (1)
- Describe the general computer controls.(Solved)
Describe the general computer controls.
Date posted: May 10, 2019. Answers (1)
- Explain the defense strategies implemented for computer crimes.(Solved)
Explain the defense strategies implemented for computer crimes.
Date posted: May 10, 2019. Answers (1)
- Describe intentional threats.(Solved)
Describe intentional threats.
Date posted: May 10, 2019. Answers (1)
- Describe Unintentional threats.(Solved)
Describe Unintentional threats.
Date posted: May 10, 2019. Answers (1)
- Describe computer systems Vulnerability.(Solved)
Describe computer systems Vulnerability.
Date posted: May 10, 2019. Answers (1)
- Describe the database availability.(Solved)
Describe the database availability.
Date posted: May 10, 2019. Answers (1)
- Describe the database management systems security features.(Solved)
Describe the database management systems security features.
Date posted: May 10, 2019. Answers (1)
- Outline the database security issues.(Solved)
Outline the database security issues.
Date posted: May 10, 2019. Answers (1)
- Describe database security.(Solved)
Describe database security.
Date posted: May 10, 2019. Answers (1)
- State and explain the contents of a database.(Solved)
State and explain the contents of a database.
Date posted: May 10, 2019. Answers (1)
- Explain the disadvantages of database approach.(Solved)
Explain the disadvantages of database approach.
Date posted: May 10, 2019. Answers (1)
- State and explain the features that characterize a database approach.(Solved)
State and explain the features that characterize a database approach.
Date posted: May 10, 2019. Answers (1)
- State and explain the Limitations of a file system.(Solved)
State and explain the Limitations of a file system.
Date posted: May 10, 2019. Answers (1)
- Describe file systems.(Solved)
Describe file systems.
Date posted: May 10, 2019. Answers (1)
- Describe data warehousing.(Solved)
Describe data warehousing.
Date posted: May 10, 2019. Answers (1)
- Describe data mining.(Solved)
Describe data mining.
Date posted: May 10, 2019. Answers (1)
- Give the problems with IT planning.(Solved)
Give the problems with IT planning.
Date posted: May 10, 2019. Answers (1)
- Describe the completion of projects on time and within budgets.(Solved)
Describe the completion of projects on time and within budgets.
Date posted: May 10, 2019. Answers (1)