FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What are three methods that can be used to ensure confidentiality of information? (Choose three.)
A
file permission settings
B
two factor authentication
C
data encryption
D
username ID and password
E
version control
Explanation: 

Detailed explanation-1: -Data encryption is another common method of ensuring confidentiality. User IDs and passwords constitute a standard procedure; two-factor authentication (2FA) is becoming the norm. Other options include Biometric verification and security tokens, key fobs or soft tokens.

Detailed explanation-2: -There are a number of measures that can be taken to assist with confidentiality including multi-factor authentication, strong passwords, encryption, segregation of data, and assigning users with appropriate user privilege levels.

Detailed explanation-3: -Methods used to ensure confidentiality include data encryption, authentication, and access control.

Detailed explanation-4: -Confidentiality is one of the concepts of the CIA triad which is a security model. Confidentiality prevents access and modification of data by unauthorized users. It ensures only the authorized users can access and modify data. This allows data to remain protected and secured and offers an abstraction of data as well.

There is 1 question to complete.