Chapter 7 Information Systems Controls for Systems Reliability Part 2 Final Exam

Software that limits what actions read copy print etc

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Either key can encrypt something, but only the other key in that pair can decrypt it 16. Key escrow p. An encryption process that uses the same key to both encrypt and decrypt q. The inability to unilaterally deny having created a document or file or having agreed to perform a transaction 1 Chapter 7 Information Systems Controls for Systems Reliability Part 2 Confidentially, Privacy, Processing Integrity, and Availability Final Exam r. Software that limits what actions (read, copy, print, etc.) that users granted access to a file or document can perform Answer one of the following questions: 1. From the viewpoi...
View Full Document

Ask a homework question - tutors are online