Question: Answer the following question clearly by providing examples wherever possible. Your answer will be assessed based on: The extent to which you have answered the
Answer the following question clearly by providing examples wherever possible. Your answer will be assessed based on: The extent to which you have answered the questions concisely, clearly, and completely. Level of comprehensiveness (too much can be almost as bad as too little). Depth and insight demonstrated, and examples provided. Information systems security has become one of the important issues in the contemporary life of enterprises. (a) Explain the major reasons that necessitated enterprises to deal with information (system/infrastructure) security (2 marks). (b) State and explain the two major categories of threats (4 marks). (c) What does authentication control mean? Name and describe the four types of authentication controls that can be used for access to information resources. (4 marks)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
