COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Data Strategy, Data Integrity, Data Storage
|
|
Data Integrity, Data Availability, Data Confidentiality
|
|
Data Availability, Data Storage, Data Mining
|
|
Data mining, Data Confidentiality, Data Storage
|
Detailed explanation-1: -The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability. Each component represents a fundamental objective of information security.
Detailed explanation-2: -There are three core elements to data security that all organizations should adhere to: Confidentiality, Integrity, and Availability.
Detailed explanation-3: -The main objectives of InfoSec are typically related to ensuring confidentiality, integrity, and availability of company information.
Detailed explanation-4: -In order to identify the threats that apply to a storage network, access paths to data storage can be categorized into three security domains: application access, management access, and BURA (backup, recovery, and archive).