COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following components of Security pertains about the who is authorized to use data?
A
Integrity
B
Availability
C
Confidentiality
D
Authenticity
Explanation: 

Detailed explanation-1: -Availability. Availability is the security attribute that ensures data and services are available to authorized users whenever required.

Detailed explanation-2: -Confidentiality. Integrity. Availability. Non-repudiation. Authorization. Trust. Accounting.

There is 1 question to complete.