COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Sarah puts a lock on her diary so only she can read it. Her little brother breaks the lock and reads her diary.Which part of the CIA triad was broken?
A
Confidentiality
B
Integrity
C
Availability
D
All of the above
Explanation: 

Detailed explanation-1: -Integrity has been broken. This is because the trust between the two parties has been compromised.

Detailed explanation-2: -It can allow an unauthenticated user access to all systems. Which access control administration method involves distributing the process to localized parts of the enterprise? Centralized.

Detailed explanation-3: -WannaCry is an example of crypto ransomware, a type of malicious software (malware) used by cybercriminals to extort money. Ransomware does this by either encrypting valuable files, so you are unable to read them, or by locking you out of your computer, so you are not able to use it.

Detailed explanation-4: -Three components of a cybersecurity strategy. As organizations develop their cybersecurity strategies, they should consider 3 critical elements to gain maximum impact, namely, governance, technology, and operations.

There is 1 question to complete.