FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
In the CIA Triad, which one of the following is not involved?
A
Availability
B
Confidentiality
C
Authenticity
D
Integrity
Explanation: 

Detailed explanation-1: -Answers. CIA refers to Confidentiality, Integrity, and Availability that are also considered as the CIA triad. However, the CIA triad does not involve Authenticity.

Detailed explanation-2: -Authentication is the verification of a user or system’s identity, while Authorization is the access privileges granted to an authenticated identity (Stouffer et al. 2015). To put it another way, authorization is what data you have access to, and authentication is how you access that data. CIA Triad example.

Detailed explanation-3: -C, N and O are in same row not in the same group and also their physical properties are different. Therefore they are not considered as a triad.

Detailed explanation-4: -1 Answer. For explanation I would say: This approach of naming it CIA Triad as AIC (Availability, Integrity, Confidentiality) Triad because people get confused about this acronym with the abbreviation and the secret agency name Central Intelligence Agency.

Detailed explanation-5: -The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.

There is 1 question to complete.