COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
____ are good security practices.
A
Scan files and media for malware
B
Keep antivirus and computer software updated
C
Be careful of unsolicited emails and text messages
D
All of the above
Explanation: 

Detailed explanation-1: -It relies on five major elements: confidentiality, integrity, availability, authenticity, and non-repudiation.

Detailed explanation-2: -When we discuss data and information, we must consider the CIA triad. The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.

Detailed explanation-3: -Physical security. Digital security. Operational security. Administrative security. 07-Dec-2017

There is 1 question to complete.