COMPILER DESIGN

ADVANCED TOPICS IN COMPILER DESIGN

CODE GENERATION FOR OBJECT ORIENTED LANGUAGES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which one of the five pillars of cybersecurity is the following example a violation of:A hospital posts all patient medical records on its public Web site.
A
Authentication
B
Availability
C
Confidentiality
D
Integrity
E
Nonrepudiation
Explanation: 

Detailed explanation-1: -The five pillars are integrity of data in its original form, availability for authorized parties, identity authenticity, data confidentiality and non-repudiation.

Detailed explanation-2: -Examples of attacks on integrity include email fraud attacks (which compromise the integrity of communications), financial fraud and embezzlement through modification of financial records, even attacks like Stuxnet that impacted the integrity of industrial control systems data flows to cause physical damage.

Detailed explanation-3: -A good example of methods used to ensure confidentiality is requiring an account number or routing number when banking online. Data encryption is another common method of ensuring confidentiality.

There is 1 question to complete.