Question

What are the most important tools and technologies for safeguarding information resources?
Name and describe three authentication methods.
Describe the roles of firewalls, intrusion detection systems, and antivirus software in promoting security.
Explain how encryption protects information.
Describe the role of encryption and digital certificates in a public key infrastructure.
Distinguish between fault tolerance and high-availability computing, and between disaster recovery planning and business continuity planning.
Identify and describe the security problems posed by cloud computing.
Describe measures for improving software quality and reliability.



$1.99
Sales0
Views193
Comments0
  • CreatedJuly 18, 2014
  • Files Included
Post your question
5000