ADVANCED TOPICS IN COMPILER DESIGN
CODE GENERATION FOR OBJECT ORIENTED LANGUAGES
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Authentication
|
|
Availability
|
|
Confidentiality
|
|
Integrity
|
|
Nonrepudiation
|
Detailed explanation-1: -The five pillars are integrity of data in its original form, availability for authorized parties, identity authenticity, data confidentiality and non-repudiation.
Detailed explanation-2: -Examples of attacks on integrity include email fraud attacks (which compromise the integrity of communications), financial fraud and embezzlement through modification of financial records, even attacks like Stuxnet that impacted the integrity of industrial control systems data flows to cause physical damage.
Detailed explanation-3: -A good example of methods used to ensure confidentiality is requiring an account number or routing number when banking online. Data encryption is another common method of ensuring confidentiality.