Why is compliance important for the reliability of the information?
What is an example of a security incident?
Which of the following measures is a preventive measure?
Logging in to a computer system is an access-granting process consisting of three steps: identification, authentication and authorization. What occurs during the first step of this process: identification?
Who is authorized to change the classification of a document?