Computer Science, asked by kamrulbuet97, 6 months ago

Q1. You own a laptop and a mobile phone. For each device, describe two methods you could use to improve the device’s security and reduce its vulnerability to cyber security threats. Q2. 4. Explain the difference between logical and physical access control. Choose an example of a physical and a logical access control mechanism that you use in your daily life. For each one, outline the procedure that you follow to use the access control.

Answers

Answered by AVishwakarma
0

Answer:

Three access control paradigms organize how people gain access: role-based access control (RBAC), discretionary access control (DAC), and mandatory access control (MAC).

Similar questions