Talking about the different approaches to security in c…

Talking about the different approaches to security in computing, the principle of regarding the computer system
itself as largely an untrusted system emphasizes:

Talking about the different approaches to security in computing, the principle of regarding the computer system
itself as largely an untrusted system emphasizes:

A.
most privilege

B.
full privilege

C.
least privilege

D.
null privilege

E.
None of the choices.

Explanation:
There are two different approaches to security in computing. One focuses mainly on external threats, and
generally treats the computer system itself as a trusted system. The other regards the computer system itselfas largely an untrusted system, and redesigns it to make it more secure in a number of ways.
This technique enforces the principle of least privilege to great extent, where an entity has only the privileges
that are needed for its function.



Leave a Reply 0

Your email address will not be published. Required fields are marked *