During an audit, it's found that employees have more access privileges than required for their roles. This situation highlights the need for ____________.
- Access Control
- Least Privilege
- Role-Based Access Control
- Separation of Duties
The principle of least privilege dictates that individuals should have only the minimum level of access required to perform their job functions. In this situation, the audit reveals an excess of access privileges, emphasizing the need to adhere to the least privilege principle. Implementing proper access controls, such as role-based access control, helps enhance security by limiting access to essential functions.__________________________________________________
Loading...
Related Quiz
- In public-key cryptography, the decryption key is kept private and is known as the _______ key.
- A company discovers an unknown vulnerability being exploited in its software. This vulnerability was not previously reported or documented. This is an example of a ____________.
- The ____________ layer in the OSI model is responsible for establishing, managing, and terminating connections between applications.
- What is the purpose of using MAC address filtering in a wireless network?
- To ensure the authenticity and integrity of data, digital signatures use cryptographic _______.