COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
confidentiality
|
|
integrity
|
|
availability
|
|
publicity
|
Detailed explanation-1: -Firewalls, password protection, and multi-factor authentication are all types of data security measures typically employed.
Detailed explanation-2: -Ensure that your data backup system protects data access, integrity and security. You can achieve data security during the backup process by using encryption in transit from the main location to the backup site. You can also potentially scan data while at rest, looking for anomalies and possible data leakage.
Detailed explanation-3: -Identity Access Management. Active Directory Security. Manage Inactive Accounts. Password Expiry Notifications. Data Security. Data Classification. Data Access Governance. Compromised Users. Compliance. ISO. HIPAA. DSARs. Manage Event Logs. Restore Deleted Objects. Rollback Unwanted Changes. Session Recording. 01-Dec-2022