Match each word to a suitable definition
Download 304.58 Kb. Pdf ko'rish
|
18-mavzu
- Bu sahifa navigatsiya:
- TRANSACTION SECURITY
- 2. Read the text and answer to the questions
- Find the correct answers
Match each word to a suitable definition 1 attack A something that protects a website from attacks 2 authentication B connected to the internet or available through the internet 3 Connection C to protect information by putting it into a special code that only some people can read 4 encrypt D someone who uses computers to secretly use or change the information in another person’s computer system 5 firewall E the boundary between the public part of a network and the private part 6 hacker F a business deal or action such as buying or selling something 7 layer G an attempt to cause damage or injury 8 online H proof that something is true or real 9 perimeter J when two or mare machones or telephones are joined together or joined to a larger system,using an electrical connection 10 restricted I a system that protects acomputer network and prevent other people from using it or damaging it 11 security K one of several different levels in a system 12 transaction M limited to a small group of people or things 1 2 3 4 5 6 7 8 9 10 11 12 g c b i e d j f k m a h TRANSACTION SECURITY Transaction security is a framework that intercepts real-time Salesforce events and applies appropriate actions and notifications based on security policies you create. Transaction security monitors events according to the policies that you set up. These policies are applied against events in your org and specify actions to take when certain event combinations occur. When a policy is triggered, you can have an action taken and receive an optional notification. Policies evaluate activity using events that you specify. For each policy, you define real-time actions, such as notify, block, force two-factor authentication, freeze user, or end a session. Activate and configure transaction security on your org before creating your own custom policies. Only an active user assigned the System Administrator profile can use this feature. Create your own custom legacy policies triggered by specific events. You receive the notifications you have selected when an enabled policy is triggered. The notifications are formatted for easy recognition. Security policy management isn’t always easy, especially when you have many policies. To make sure that your policies remain functional over time, write and maintain them using these best practices. Well- structured and tested policies keep your employees and customers connected, productive, and secure. 2. Read the text and answer to the questions: 1. What is transaction security based on? Transaction Security is a framework that captures real-time Salesforce events and applies appropriate actions and notifications based on the security policies you create. 2. How does Transaction Security track events? Transaction security tracks events according to the policies you set. 3. When do these policies take effect? These policies apply to events in your organization and define actions to take when certain combinations of events occur. 4. What do you define for each policy? For each policy, you define real-time actions such as notify, block, enforce two-factor authentication, freeze the user, or terminate the session. 5. What should you do before creating your own policy? it is necessary to start work based on the safety rule 6. Who is the only person who can use the function? will be the owner 7. When will you receive the notifications you have chosen? When the policy is activated, you can perform the action and receive an optional notification. 8. Notifications are formatted for recognition. 9. When does security policy management become difficult? if a virus falls or the codes are revealed 10. What keeps your employees and customers connected, productive and safe? high security regulations Find the correct answers 1. An electronic visual computer display including a screen..----------monitor 2. Keypad where you can enter letters and numbers------keyboard 3. An output hardware device that connects to a computer to produce sound 4. The secret word or phrase that must be used to access the site.----login password 5. A small device that a computer user slides across a desk surface to point to a location on the display screen.---- mouse 6. A printed circuit board containing the main components of a computer or other device, with connectors for other circuit boards. - motherboard 7. A global network that provides various means of information and communication, consisting of interconnected networks using standardized communication. Download 304.58 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling