FUNDAMENTALS OF COMPUTER

TELECOMMUNICATIONS SYSTEMS

HOW STAR BUS RING MESH TOPOLOGY CONNECT COMPUTER NETWORKS IN ORGANIZATIONS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What measures protect information from unauthorized access and misuse?
A
Fire wall
B
Confidentiality
C
Integrity
D
Data base
Explanation: 

Detailed explanation-1: -Passwords, access control lists and authentication procedures use software to control access to resources. These access control methods are complemented by the use encryption to protect information that can be accessed despite the controls, such as emails that are in transit.

Detailed explanation-2: -Confidentiality refers to the protection of information from unauthorized access or disclosure. Ensuring confidentiality is ensuring that those who are authorized to access information are able to do so and those who are not authorized are prevented from doing so.

Detailed explanation-3: -Answer: (b) Encryption Information is protected using encryption and decryption methods and a conversion algorithm.

There is 1 question to complete.