COMPUTER ETHICS AND SECURITY
CRYPTOGRAPHY AND ENCRYPTION
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Confidentiality only
|
|
Integrity only
|
|
Availability only
|
|
Confidentiality and Integrity
|
Detailed explanation-1: -Confidentiality is all about making sure that data is accessible only to its intended parties. Attacks on confidentiality can include: Cracking encrypted data. Man-in-the-middle attacks on plaintext data which is intended to be private (Why isn’t it encrypted then?)
Detailed explanation-2: -The three letters in “CIA triad” stand for Confidentiality, Integrity, and Availability. The CIA triad is a common model that forms the basis for the development of security systems. They are used for finding vulnerabilities and methods for creating solutions.
Detailed explanation-3: -In this context, confidentiality is a set of rules that limits access to information, integrity is the assurance that the information is trustworthy and accurate, and availability is a guarantee of reliable access to the information by authorized people.
Detailed explanation-4: -The CIA Triad-Confidentiality, Integrity, and Availability-is a guiding model in information security.
Detailed explanation-5: -Confidentiality, Integrity, and Availability. These are the three core components of the CIA triad, an information security model meant to guide an organization’s security procedures and policies.