Information Storage Management 认证题库题解系列 题21

clip_image001

 

Work:

Access control services regulate user access to data. These services mitigate the threats of spoofing host identity and elevating host privileges. Both these
threats affect data integrity and confidentiality.

Access control mechanisms used in the application access domain are user and host authentication (technical control) and authorization (administrative
control). These mechanisms may lie outside the boundaries of the storage net-work and require various systems to interconnect with other enterprise identity
management and authentication systems, for example, systems that provide strong authentication and authorization to secure user identities against spoofing.

 

Answer:

Authentication and authorization.

posted on 2013-04-13 18:59  中道学友  阅读(228)  评论(0编辑  收藏  举报

导航

技术追求准确,态度积极向上