Why doesn’t the last phase of the security process mark the end of the security process?
R1. Why doesn’t the last phase of the security process mark the end of the security process?
R2. Does an employer in the US have an unconditional right to search employee desks or lockers on company premises? Why or why not? Is there a way by which the employer
can legally perform such searches?
R3. Explain the difference between authentication and authorization.
R4. Describe the five basic attacks on authentication systems.
joyce
0
