COMPUTER THREATS SECURITY
WHAT IS COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Prevention, detection, and response
|
|
People controls, process controls, and technology controls
|
|
Confidentiality, integrity, and availability
|
|
Network security, PC security, and mainframe security
|
Detailed explanation-1: -The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.
Detailed explanation-2: -Confidentiality means that data, objects and resources are protected from unauthorized viewing and other access. Integrity means that data is protected from unauthorized changes to ensure that it is reliable and correct. Availability means that authorized users have access to the systems and the resources they need.
Detailed explanation-3: -There are three primary areas or classifications of security controls. These include management security, operational security, and physical security controls.
Detailed explanation-4: -Three primary goals of information security are preventing the loss of availability, the loss of integrity, and the loss of confidentiality for systems and data. Most security practices and controls can be traced back to preventing losses in one or more of these areas.