Question: Chapter 14 - Information Security and Computer Fraud 1. ( 8 marks) Explain authentication and identify two methods that can be used to authenticate users
Chapter 14 - Information Security and Computer Fraud 1. ( 8 marks) Explain authentication and identify two methods that can be used to authenticate users ( 3 marks). Explain authorization in the context of users of computer systems ( 3 marks). Why are both critical to systems security? (2 marks)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
