COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

TYPES OF THREATS AND ATTACKS

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Mona is the data security manager for a governmental organisation. One her desired goals of security is to ensure that the data can be accessed only by those who are allowed to see it. This is known as data ____
A
confidentiality
B
integrity
C
availability
D
publicity
Explanation: 

Detailed explanation-1: -Firewalls, password protection, and multi-factor authentication are all types of data security measures typically employed.

Detailed explanation-2: -Ensure that your data backup system protects data access, integrity and security. You can achieve data security during the backup process by using encryption in transit from the main location to the backup site. You can also potentially scan data while at rest, looking for anomalies and possible data leakage.

Detailed explanation-3: -Identity Access Management. Active Directory Security. Manage Inactive Accounts. Password Expiry Notifications. Data Security. Data Classification. Data Access Governance. Compromised Users. Compliance. ISO. HIPAA. DSARs. Manage Event Logs. Restore Deleted Objects. Rollback Unwanted Changes. Session Recording. 01-Dec-2022

There is 1 question to complete.