answersLogoWhite

0


Best Answer

The people in the chairs using the computers. If the end users are not trained properly they can often be tricked into circumventing the best security measures!

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the weakest link in setting up security in a computer environment?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is the weakest link in a security chain?

personnel


What is the weakest computer virus?

Probably a affiliated tracking cookie


What is your weakest learning?

Please state what kind of learning that we are weakest? Weakest learning in what? If you meant it on the weakest learning in Subject then my weakest learning is my Algebra and calculus.


In which year did albert eistein finish the computer?

Albert Einstein didn't invent the computer he died in the early 1900's before even the weakest computers were created.


How do you use the word weakest in a sentence?

She felt that her weakest performance was during the speech competition.


What is the weakest race?

There is no such thing as the weakest race.


What are the weakest tides?

Neap tides are the weakest


What is your weakest academic area and why?

what is your weakest academic


The weakest link in computer security?

register ------------- more so the user and my oppinion below that would be the kernel. if you can edit the kernel you can do pretty much anything you want and its also less protected than the register.


Which is the weakest metal?

i believe that gold and mercury the weakest metals.


Which single factor can make or break a security plan?

There is no single factor. Every good security plan has layers of protection. If you try and rely on just one level of protection the plan will fail. As a quick example, your plan might be to protect a high value computer system from unauthorized access. It would NOT be sufficient to just password protect the system. You would have to address physical security, remote access paths, backup power, access controls and procedures and many other less obvious factors.


What is the weakest form of clone?

shadow clone is the weakest