1. Suppose a company devises a security policy which specifies that only HR personnel are authorized to see payroll files. What type of mechanism is needed to implement the policy? Explain.
2. To what does cryptography refer?
3. What is an access control list (ACL), and how is an ACL used?
4. Read about the Data Encryption Standard (DES). What size key should be used for data that is extremely important?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here