FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Company policies should restrict access to the information to authorized personnel and ensure that only those authorised individuals view this data.
A
Confidentiality
B
Integrity
C
Availability
D
None of the above
Explanation: 

Detailed explanation-1: -A system’s ability to ensure that only the correct, authorized user/system/resource can view, access, change, or otherwise use data.

Detailed explanation-2: -Confidentiality in this context means that the data is only available to authorized parties. When information has been kept confidential it means that it has not been compromised by other parties; confidential data are not disclosed to people who do not require them or who should not have access to them.

Detailed explanation-3: -Confidentiality:-Only authorized users can access the data resources and information. 2. Integrity:-Only authorized users should be able to modify the data when needed.

Detailed explanation-4: -Firewalls. Another method that an organization should use to increase security on its network is a firewall. A firewall can exist as hardware or software (or both). A hardware firewall is a device connected to the network and filters the packets based on a set of rules.

There is 1 question to complete.