Question: Name four authentication policies that can be enforced using technology and four authentication policies that cannot be enforced using technology. Discuss the reasons why the
Name four authentication policies that can be enforced using technology and four authentication policies that cannot be enforced using technology. Discuss the reasons why the second four policies can't be enforced using technology and how managers could attempt to assure compliance.
Step by Step Solution
3.46 Rating (162 Votes )
There are 3 Steps involved in it
Authentication policies that can be enforced by technology 1 Encryption This is a technique in which a plain text is converted into cipher text When someone wants to send its secret detail to particul... View full answer
Get step-by-step solutions from verified subject matter experts
Document Format (1 attachment)
1019-B-C-A-C-A(2230).docx
120 KBs Word File
