ADVANCED TOPICS IN COMPILER DESIGN
CODE GENERATION FOR OBJECT ORIENTED LANGUAGES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
An employee changes the modification metadata of a file to claim credit for the work of someone else. Which pillar of cybersecurity is this a violation of?
|
Authentication
|
|
Availability
|
|
Confidentiality
|
|
Integrity
|
|
Nonrepudiation
|
Explanation:
Detailed explanation-1: -The five pillars are integrity of data in its original form, availability for authorized parties, identity authenticity, data confidentiality and non-repudiation.
Detailed explanation-2: -The Three Pillars of Security: People, Processes, and Technology.
Detailed explanation-3: -Integrity. Upholding an information system’s integrity involves keeping its network intact and uncompromised; thus, the primary goal of this pillar is to set up safeguards that deter threats.
Detailed explanation-4: -Encryption ensures the integrity of data by protecting it from unauthorized modification.
There is 1 question to complete.