FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Any good solution to the information security problems must address to of ____ issues
A
CIB
B
CIA
C
FDA
D
Hardware
Explanation: 

Detailed explanation-1: -Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.

Detailed explanation-2: -The CIA framework serves to outline the goals and objectives of the security program and helps organizations defend against threats such as data breaches/leaks, malware attacks, phishing, account/credentials compromise, web-based attacks, etc.

Detailed explanation-3: -When we discuss data and information, we must consider the CIA triad. The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.

Detailed explanation-4: -When we think of cybersecurity risks, often the first thing that pops into our heads is the threats we face from hackers. However, based on a survey from the Ponemon Institute the reality is that the most significant threat to information security isn’t from hackers, but from our own employees.

There is 1 question to complete.