Question: Answer the following question clearly by providing examples wherever possible. Your answer will be assessed based on: The extent to which you have answered the

Answer the following question clearly by providing examples wherever possible. Your answer will be assessed based on: The extent to which you have answered the questions concisely, clearly, and completely. Level of comprehensiveness (too much can be almost as bad as too little). Depth and insight demonstrated, and examples provided. Information systems security has become one of the important issues in the contemporary life of enterprises. (a) Explain the major reasons that necessitated enterprises to deal with information (system/infrastructure) security (2 marks). (b) State and explain the two major categories of threats (4 marks). (c) What does authentication control mean? Name and describe the four types of authentication controls that can be used for access to information resources. (4 marks)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!