COMPILER DESIGN

ADVANCED TOPICS IN COMPILER DESIGN

CODE GENERATION FOR OBJECT ORIENTED LANGUAGES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
An employee changes the modification metadata of a file to claim credit for the work of someone else. Which pillar of cybersecurity is this a violation of?
A
Authentication
B
Availability
C
Confidentiality
D
Integrity
E
Nonrepudiation
Explanation: 

Detailed explanation-1: -The five pillars are integrity of data in its original form, availability for authorized parties, identity authenticity, data confidentiality and non-repudiation.

Detailed explanation-2: -The Three Pillars of Security: People, Processes, and Technology.

Detailed explanation-3: -Integrity. Upholding an information system’s integrity involves keeping its network intact and uncompromised; thus, the primary goal of this pillar is to set up safeguards that deter threats.

Detailed explanation-4: -Encryption ensures the integrity of data by protecting it from unauthorized modification.

There is 1 question to complete.