FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Maintaining equipment, performing hardware repairs, keeping operating systems and software up to date, and creating backups ensure the availability of the network and data to the authorised users.
A
Confidentiality
B
Integrity
C
Availability
D
None of the above
Explanation: 

Detailed explanation-1: -Availability. Availability is the security attribute that ensures data and services are available to authorized users whenever required. · A denial of service attack is an attack against availability.

Detailed explanation-2: -A company’s CISO is the leader and face of data security in an organization. The person in this role is responsible for creating the policies and strategies to secure data from threats and vulnerabilities, as well as devising the response plan if the worst happens.

Detailed explanation-3: -Encryption is the method by which information is converted into secret code that hides the information’s true meaning. The science of encrypting and decrypting information is called cryptography. In computing, unencrypted data is also known as plaintext, and encrypted data is called ciphertext.

Detailed explanation-4: -CIA triad examples The ATM and bank software enforce data integrity by ensuring that any transfers or withdrawals made via the machine are reflected in the accounting for the user’s bank account. The machine provides availability because it’s in a public place and is accessible even when the bank branch is closed.

There is 1 question to complete.