FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Imagine if customers of a bank are unable to access its account resources than which objective of security will be compromised here.
A
Authenticity
B
Availability.
C
Integrity.
D
Confidentiality.
Explanation: 

Detailed explanation-1: -Physical access control is utilizing physical barriers which can help prevent unauthorized users from accessing systems.

Detailed explanation-2: -As defined in FISMA, the term ‘availability’ means ensuring timely and reliable access to and use of information.

Detailed explanation-3: -Regardless of security policy goals, one cannot completely ignore any of the three major requirements-confidentiality, integrity, and availability-which support one another. For example, confidentiality is needed to protect passwords.

Detailed explanation-4: -Reuse of passwords across multiple sites: When one data breach compromises passwords, that same login information can often be used to hack into users’ other accounts. Reusing passwords for email, banking, and social media accounts can lead to identity theft.

There is 1 question to complete.