TELECOMMUNICATIONS SYSTEMS
HOW STAR BUS RING MESH TOPOLOGY CONNECT COMPUTER NETWORKS IN ORGANIZATIONS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
What measures protect information from unauthorized access and misuse?
|
Fire wall
|
|
Confidentiality
|
|
Integrity
|
|
Data base
|
Explanation:
Detailed explanation-1: -Passwords, access control lists and authentication procedures use software to control access to resources. These access control methods are complemented by the use encryption to protect information that can be accessed despite the controls, such as emails that are in transit.
Detailed explanation-2: -Confidentiality refers to the protection of information from unauthorized access or disclosure. Ensuring confidentiality is ensuring that those who are authorized to access information are able to do so and those who are not authorized are prevented from doing so.
Detailed explanation-3: -Answer: (b) Encryption Information is protected using encryption and decryption methods and a conversion algorithm.
There is 1 question to complete.