Ask Question
2 June, 12:29

What concepts, processes and tools available for protecting and securing information systems, data and identities.

+5
Answers (1)
  1. 2 June, 12:46
    0
    The tools for information security includes

    1. Authentication

    Authentication can be accomplished by identifying someone through one or more of three factors: something they know, something they have, or something they are.

    2. Access Control

    Once a user has been authenticated, the next step is to ensure that they can only access the information resources that are appropriate. This is done through the use of access control. Access control determines which users are authorized to read, modify, add, and/or delete information. Several different access control models exist. Here we will discuss two: the access control list (ACL) and role-based access control (RBAC).

    Encryption

    Many times, an organization needs to transmit information over the Internet or transfer it on external media such as a CD or flash drive. In these cases, even with proper authentication and access control, it is possible for an unauthorized person to get access to the data. Encryption is a process of encoding data upon its transmission or storage so that only authorized individuals can read it.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “What concepts, processes and tools available for protecting and securing information systems, data and identities. ...” in 📗 Business if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers