answersLogoWhite

0


Best Answer

Confidentiality

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which security design goal ensures that only authorized users can access data?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

What is the difference between share-level and user-level security?

Share-level and User-level security is actually in the category of computers. In share-Level security systems, passwords are associated with specific objects, not with users. ex. Windows XP User-Level security is the most flexible and secure method of protecting the sensitive data, code, and design of objects in an Access database. User-Level security is for if you need more control. ex. To prevent users from modifying the design of your tables and queries.


Which form view cannot be used to view data?

Okay. The previous answer was Preview. I am currently in Microsoft Access class and the actual answer, trust me on this, is Design.


What type of information is available about Internet security?

There is a nearly overwhelming amount of information available about Internet security. This information ranges from topics about hardware and software security, to personal security (such as avoiding scams) to securing financial transactions and personal information. There are graduate degrees available in Internet security, and there are professional consulting companies to design secure Internet sites and applications. Additionally, many consumer advocacy and digital awareness groups put out free articles about Internet security.


Custom Database Design?

form_title=Custom Database Design form_header=Design, develop and manage the database that fits your business needs. What do you need the database to offer?=_ Who will have access to the database?=_ Is this database for the internal or external public?= {(),Internal,External} Do you need the new database to integrate with a current system?= () Yes () No () Not Sure


What are the major inputs into physical database design?

~Normalized Relations, volume estimates, attribute definitions, response time expectations, data security needs, backup/recovery needs, integrity expectations, DBMS technology used

Related questions

How can a security framework assist in the design and implementation of a security infrastructure?

The security framework provides strategic direction to design and implement the security infrastructure. It also ensures the accomplishment of objectives.


In a Dangerous World, Single Door Access Provides Additional Security?

Single door access security systems provide additional peace of mind for a family living in a dangerous world. State-of-the-art electronic technology can be used to require passwords for entering a home. One drawback to a single door access point is the feeling of a loss of freedom. The way to design a home combining the security of single door access and freedom is to include a wrap-around patio (or porch). People can enjoy their yards, surroundings and home while feeling safer with single door access. This is a great home design solution.


What has the author Thomas Norman written?

Thomas Norman has written: 'Integrated security systems design' -- subject(s): Security measures, Computer networks, Computers, Information storage and retrieval systems, Access control


Characteristics of doors?

Doors can vary in material, size, design, and functionality. They provide privacy, security, and control of access to a space. Doors may have different types of locks and hinges for added security and ease of use.


What is the difference between share-level and user-level security?

Share-level and User-level security is actually in the category of computers. In share-Level security systems, passwords are associated with specific objects, not with users. ex. Windows XP User-Level security is the most flexible and secure method of protecting the sensitive data, code, and design of objects in an Access database. User-Level security is for if you need more control. ex. To prevent users from modifying the design of your tables and queries.


Which stage in the system life cycle ensures that the computer system will perform as expected?

system design


In access Which button do you use to create a table in design view?

table design


Which network design process identifies where to place access points?

A site survey is the network design process that identifies where to place access points.


Which layer in the hierarchical Ethernet design model ensures that traffic between local networks will be allowed?

Distribution


What does design view do on Microsoft access?

H


Which form view cannot be used to view data in access?

Design View


How do you change the design of a query in Access?

You can do it in the Design Grid in Design View or you can do it through SQL view if you know how to use SQL.