COMPUTER THREATS SECURITY
TYPES OF COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Confidentiality
|
|
Integrity
|
|
Availability
|
|
Authenticity
|
Detailed explanation-1: -Explanation: Integrity means that computer system assets can be modified only by authorized parities. Confidentiality means that the assets can only be accessed by authorized parties.
Detailed explanation-2: -Confidentiality: Requires that the data only be accessible for reading by authorized parties. Integrity: Requires that only authorized parties can modify data. Availability: Requires that data are available to authorized parties. Network security threats are passive or active.
Detailed explanation-3: -Integrity means that assets can be modified only by authorized parties or only in authorized ways. Availability means that assets are accessible to authorized parties at appropriate times.
Detailed explanation-4: -A confidentiality policy is intended to protect secrets; specifically, it is intended to prevent unau-thorized disclosure of information. One model (general purpose template) of a confidentiality policy is the Bell–LaPadula (BLP) security model.
Detailed explanation-5: -Availability means that assets are accessible to authorized parties at appropriate times. In other words, if some person or system has legitimate access to a par-ticular set of objects, that access should not be prevented. For this reason, avail-ability is sometimes known by its opposite, denial of service.