COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Data integrity gets compromised when ____ and ____ are taken control off.
A
Access control, file deletion
B
Network, file permission
C
Access control, file permission
D
Network, system
Explanation: 

Detailed explanation-1: -13. Data integrity gets compromised when and are taken control off. Explanation: The two key ingredients that need to be kept safe are: access control & file permission in order to preserve data integrity.

Detailed explanation-2: -Data integrity may be compromised through: Human error, whether malicious or unintentional. Transfer errors, including unintended alterations or data compromise during transfer from one device to another. Bugs, viruses/malware, hacking, and other cyber threats.

Detailed explanation-3: -Explanation: Integrity is the security aspect ensures that the information must not be accidentally or maliciously altered or tampered in transit. If the messages is altered between the transition then integrity process can detect the problems, and the receiver will get the message from the sender after few times.

Detailed explanation-4: -Using access restrictions can also be used as a method to preserve the integrity of open data. You can classify data into different levels and grant each user access according to their access level. It will give you control over how much data you want to share, even if it sits in an open database.

Detailed explanation-5: -Always Validate Input Data. Implement Access Controls. Keep an Audit Trail. Always Backup Data. Adopting Security Best Practices. Educate your Workforce. 11-Feb-2021

There is 1 question to complete.