answersLogoWhite

0


Best Answer

"How the limits of a particular electronic information system and the security level of users may affect the information that is accessible on that system?"

User Avatar

Wiki User

16y ago
This answer is:
User Avatar
More answers
User Avatar

AnswerBot

6mo ago

The limits of an electronic information system, such as storage capacity or processing speed, can affect the amount and type of information that can be accessed on the system. If the system has limited storage, for example, it may only be able to store a limited amount of information, resulting in some data being inaccessible. Additionally, the security level of users can impact the information accessible on the system, as users with lower security permissions may be restricted from accessing certain sensitive or confidential information.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How the limits of a particular electronic information system and the security level of users may affect the information that is accessible on that system?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Information Science

What IS Governance Goals describes using information security knowledge and infrastructure efficiently and effectively to ensure captured knowledge is available?

Governance goals involving information security encompass utilizing security measures to safeguard data and infrastructure, ultimately ensuring that valuable knowledge remains accessible and protected. By implementing efficient security protocols, organizations can minimize risks and maintain the availability and integrity of critical information assets.


What of these is NOT an example of sensitive information?

Publicly available information is NOT an example of sensitive information. Sensitive information typically includes personal data such as Social Security numbers, credit card information, health records, or confidential business documents. Publicly available information is freely accessible to the public and does not require protection.


What is hipaas security rule?

The HIPAA, or Health Insurance Portability and Accountability Act on 1996, was developed to protection and security of one health information, appointments, medical surgeries and much more.


Is someones personal information secure over a network database?

It depends on how well the network database is protected. Measures such as encryption, access controls, and regular security audits can help ensure the security of personal information stored on a network database. However, no system can be 100% secure, so it's important to continually monitor and update security measures to minimize the risk of data breaches.


What is given each and every time information is collected from an individual during the personnel security investigation?

During a personnel security investigation, individuals are typically required to provide personal information such as their full name, contact details, employment history, education credentials, family background, criminal record (if any), financial status, and references. This information is used to conduct background checks and assess the individual's suitability for a particular role or security clearance.

Related questions

What has the author James A Schweitzer written?

James A. Schweitzer has written: 'Protecting information in the electronic workplace' -- subject(s): Access control, Computers, Electronic data processing departments, Security measures 'Computers, business, and security' -- subject(s): Computer security, Electronic data processing departments, Industries, Security measures 'Managing information security' -- subject(s): Business intelligence, Computer security, Electronic data processing, Electronic data processing departments, Security measures 'Computer crime and business information' -- subject(s): Computer crimes, Electronic data processing departments, Information resources management, Security measures


What Is focused on protecting the valuable electronic information of organizations and users?

information security is the answer


Is cyber security same as that of e security?

The practise of protecting networks, computers, servers, mobile devices, electronic systems, and data from malicious attacks is known as cyber security. It is also referred to as electronic information security or information technology security.


What does information protection refer to?

Security of the systems and tools to protect the information from physical or electronic attack.


What does protection refers to?

Security of the systems and tools to protect the information from physical or electronic attack.


Where can one find information about electronic data?

Electronic signature are meant to indicate a person's consent to a specific electronic content. There are numerous online resources one can use to obtain additional information and software like Adobe that supports electronic signature.


What are two different aspects of information security?

Two different aspects of information security are confidentiality, which ensures that data is only accessible to authorized individuals, and integrity, which guarantees that data remains accurate and trustworthy by preventing unauthorized modifications.


What is electronic personnel security questionnaire?

The Electronic Personnel Security Questionnaire is a permanent document.


What are the dangers and security risks of using electronic medical records?

All electronic records have some security risks. However they also allow doctors to share information that saves time, lives and money so the trade off is in their favor.


Security of electronic banking?

how many kinds of electronic banking?


Tracking and plotting tools can be electronic but because of security there should never be a hard copy or paper backup made of this information?

FALSE


What is the Electronic Personnel Security Questionnaire?

The Electronic Personnel Security Questionnaire is a permanent document.