COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
____ are good security practices.
|
Scan files and media for malware
|
|
Keep antivirus and computer software updated
|
|
Be careful of unsolicited emails and text messages
|
|
All of the above
|
Explanation:
Detailed explanation-1: -It relies on five major elements: confidentiality, integrity, availability, authenticity, and non-repudiation.
Detailed explanation-2: -When we discuss data and information, we must consider the CIA triad. The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.
Detailed explanation-3: -Physical security. Digital security. Operational security. Administrative security. 07-Dec-2017
There is 1 question to complete.