COMPILER DESIGN

ADVANCED TOPICS IN COMPILER DESIGN

CODE GENERATION FOR OBJECT ORIENTED LANGUAGES

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which one of the five pillars of cybersecurity is the following example a violation of:A student uses a bug in a teacher’s grade-book software to change all student grades to As.
A
Authentication
B
Availability
C
Confidentiality
D
Integrity
E
Nonrepudiation
Explanation: 

Detailed explanation-1: -The five pillars are integrity of data in its original form, availability for authorized parties, identity authenticity, data confidentiality and non-repudiation.

Detailed explanation-2: -Examples of attacks on integrity include email fraud attacks (which compromise the integrity of communications), financial fraud and embezzlement through modification of financial records, even attacks like Stuxnet that impacted the integrity of industrial control systems data flows to cause physical damage.

Detailed explanation-3: -Which of the following act violates cyber security? a) Exploit b) Attack c) Threat d) Vulnerability View Answer Answer: b Explanation: A threat is a possible danger that might lead to a security breach and cause harm to the system or network.

There is 1 question to complete.