____________ in information security involves ensuring that all actions on a system can be attributed to an authenticated identity.
- Accountability
- Anonymity
- Integrity
- Non-repudiation
Accountability in information security is the practice of ensuring that all actions on a system can be traced back to an authenticated identity. This helps establish responsibility for activities within a system, preventing unauthorized actions and providing a clear audit trail. Understanding accountability is crucial for effective security measures and maintaining a trustworthy computing environment.__________________________________________________
Loading...
Related Quiz
- An intelligence report suggests a new malware variant is spreading in the wild, using a previously unknown vulnerability. This type of report is categorized as ____________ Threat Intelligence.
- In API security, what is the primary purpose of implementing a WAF (Web Application Firewall)?
- HIPAA’s Privacy Rule establishes national standards to protect what kind of individual information?
- An employee using their access to steal confidential company data for personal gain is an example of which type of insider threat?
- In role-based access control (RBAC), permissions are assigned based on what criteria?