Unformatted text preview: l with the description. (2 points)
A. Authentication B. Authorization C. Defense - in- Depathth
D. Demilitarized zone (DMZ) E. Encryption F. Firewall
________ The process of transforming normal text, called plaintext, into unreadable gibberish, called ciphertext.
________ Restricting access of users to specific portions of the system as well as specific tasks
________ The process of turni...
View Full Document
- Spring '14
- Accounting, Output controls, Physical access controls, Emergency RESPONSE TEAMS, log analysis, processing controls