RESPOND TO TIS STUDENT 50-100 WORDS
Authentication and Authorization are of the primary information security areas. Authentication is to confirm who you are. Making sure you are the person that should be accessing this information. Authorization is having access to the information at hand. Normally you have authentication and authorization through a program. For example your on line banking. On line banking requires you to have authenticity and authorization to gain access to your account. Without this information you are not allowed to gain access to your banking information. Preventing and Resistance is preventing someone from having access to important information. One example I can think of is my work email. When ever we get an email from an outside source our “Firewall” blocks the email, alerts us that this is an email outside of our company, and cautions us to open with care. Meaning be careful of this email, it’s foreign to our system. Theirs so many ways your personal information can be breached within the world of internet. One way is called cyber-terrorism, cyber-terrorism is when someone tries to intimidate you via a computer. The best way to prevent this type of issue is through detection and response. The best example I could think of is “Facebook”. I have had a FB account for several years, and it amazes me how I have been hacked so many times with individuals using my page to create false pages. Attempting to portray that they are me. How I make sure no one is using my information to create a new page, every now and again I would reach out to all of my friends on FB and let them know, “please do not accept any new friend request from me without confirming with me first.This may not completely prevent people from stealing your info, but it’s a start. At present, contractual obligations and laws that prohibit hacking, such as the Computer Fraud and Abuse Act and the Digital Millennium Copyright Act, are adopting a strict liability approach, which criminalizes almost any form of hacking, regardless of motivation or potential benefits (Kilovalty, 2019).
Kilovalty, I. (2019). Freedom to Hack. Ohio State Law Journal, 80(3), 455–520. Retrieved from http://search.ebscohost.com/login.aspx?direct=true…
Looking for a solution written from scratch with No plagiarism and No AI?

WHY CHOOSE US?
We deliver quality original papers |
Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected |
Free revisions |
We offer our clients multiple free revisions just to ensure you get what you want. |
Discounted prices |
All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount |
100% originality |
We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI |
On-time delivery |
We will deliver your paper on time even on short notice or short deadline, overnight essay or even an urgent essay |