COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Ensures that information is correct and no authorized person or malicious software has altered that data
A
Integrity
B
Confidentiality
C
Availability
D
Authenticity
Explanation: 

Detailed explanation-1: -Integrity involves maintaining the consistency, accuracy and trustworthiness of data over its entire lifecycle. Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people (for example, in a breach of confidentiality).

Detailed explanation-2: -Advanced Persistent Threat (APT)-Security actions that ensure that data is accessible to authorized users.

Detailed explanation-3: -A company’s CISO is the leader and face of data security in an organization. The person in this role is responsible for creating the policies and strategies to secure data from threats and vulnerabilities, as well as devising the response plan if the worst happens.

Detailed explanation-4: -The correct answer is Data Security. Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security is also known as System Data Security, Information Security or Computer security.

There is 1 question to complete.