Question: Authentication and hacking controls at an environmental consulting company. Required: a. From the list of general controls shown in Exhibit 4-5, list each authentication and
Required:
a. From the list of general controls shown in Exhibit 4-5, list each authentication and hacking control that you think the EnviroCons Company should have in place.
b. Explain how each control that you list can prevent IT related risks for EnviroCons.
c. Are there any general controls that you think would not be cost-beneficial?
Step by Step Solution
3.35 Rating (167 Votes )
There are 3 Steps involved in it
a Any of the Authentication controls could be used including user IDs passwords security tokens or smart cards biometric devices login procedures acce... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
375-B-A-I-S (5253).docx
120 KBs Word File
