COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Which of the following components of Security pertains about the who is authorized to use data?
|
Integrity
|
|
Availability
|
|
Confidentiality
|
|
Authenticity
|
Explanation:
Detailed explanation-1: -Availability. Availability is the security attribute that ensures data and services are available to authorized users whenever required.
Detailed explanation-2: -Confidentiality. Integrity. Availability. Non-repudiation. Authorization. Trust. Accounting.
There is 1 question to complete.