Question: Multiple users can share a system but cannot access each other's information. [ Choose ] A programming object contains all necessary methods it needs to

Multiple users can share a system but cannot access each other's information.
[ Choose ]
A programming object contains all necessary methods it needs to operate. One programming object does not need to know how a different object operates internally.
[ Choose ]
Components operate relatively independently. One component can be replaced or changed without changing other components.
[ Choose ]
Systems following this principle are easier to support and troubleshoot.
[ Choose ]
Users can share a badge reader and keypad for entering a building, but each user has their own ID badge and PIN.
[ Choose ]
One must always assume that the adversary has access to the same equipment and programs that you have. Your security should not rely on hiding the system you use.
[ Choose ]
A spreadsheet protected with a password, that is in an encrypted folder on a PC that requires biometric authentication and an ID and password, is demonstrating this principle.
[ Choose ]
Users should have access to the systems or information required to do their job and nothing more.
[ Choose ]
You have a safe with an electronic lock. If the power fails, the safe does NOT pop open.
[ Choose ]
Make the attacker's job more difficult, but do not create an excess burden on the users in the name of security.
[ Choose ]
If you properly authenticate to one server in the domain, then all of the servers accept you.
[ Choose ]
The system regularly validates your credentials to make sure that you are still allowed access.
[ Choose ]
Over the weekend, you change all of the key locks in the building to fingerprint scanners. Which principle did you violate?
[ Choose ]
Requiring a 64 character password would be the opposite of this principle.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!