In the context of information security, which attribute other than individual identity and group membership can be used to restrict unauthorized access?

A.
Role
B.
Cryptography
C.
World Wide Name
D.
Host network address
You must be logged in to post a comment.
Role
0
0