COMPUTER THREATS SECURITY
TYPES OF COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
central intelligence agency
|
|
conformity, intellect, availability
|
|
confidentiality, integrity, availability
|
|
conformity, integrity, assurance
|
Detailed explanation-1: -Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.
Detailed explanation-2: -The CIA Triad-Confidentiality, Integrity, and Availability-is a guiding model in information security. A comprehensive information security strategy includes policies and security controls that minimize threats to these three crucial components.
Detailed explanation-3: -When we discuss data and information, we must consider the CIA triad. The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.
Detailed explanation-4: -Confidentiality-You need to know your data is protected from unauthorized access. Integrity-You have to be able to trust your data. Availability-You need to be able to access your data.