Students
Click on the tabs below to view the content for chapter 3.
Chapter 4: Powerpoint
Chapter 4: Objectives
- Define secure socket layers, ciphers, and encryption in an authentication policy.
- Identify and describe the intrusions and threats which an authentication policy protects a system from.
- Discuss what the organization considers an asset and why.
Chapter 4: Questions
- Describe the purpose of authorization, identification, and authentication.
- What do authorization, identification, and authentication protect an organization from?
- What is the organization protecting? Why?