Question: When we are working in shared workspaces, we need to make it impossible for someone to deny that they were the one who made changes

When we are working in shared workspaces, we need to make it impossible for someone to deny that they were the one who made changes to the data. This assurance of the origin of the changes is known as ________.
Question 2(1 point)
Question 2 options:
Before allowing you to pick up your RIT ID, a staff member in the registrar's office verifies that your address in the system matches the address on your student record. This process is known as _______.
Question 3(1 point)
Question 3 options:
If individual users could grant read or write access to their files to other users, this access control model is called ________ access control.
Question 4(1 point)
Question 4 options:
A security team systematically reviews all processes, controls, and systems to ensure they comply with established security policies and regulations. This process is known as _____.
Question 5(1 point)
Question 5 options:
When you log into MyCourses, the mechanism that allows you to obtain and use information for a specific course is called____ control.
Question 6(1 point)
Question 6 options:
When events are recorded for later observation and analysis, this is known as _______.
Question 7(1 point)
Question 7 options:
In MyCourses, you can only gain access to your own student record and cannot make changes to the course content. This reflects the principle of _________in authorization.
Question 8(1 point)
Question 8 options:
MyCourses uses a model for controlling access based on functions, such as teacher, student, teaching assistant. This access control model is called ________ access control.
Question 9(1 point)
Question 9 options:
Real-time observation on what is occurring on a network or a system is known as ______.
Question 10(1 point)
Question 10 options:
You have to pick up your RIT ID at the registrar's office. When you arrive, you are asked to prove who you are with a state-issued or country-issued ID such as a driver's license or passport. This proof of identity is known as ____________.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!