COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Confidentiality
|
|
Integrity
|
|
Authenticity
|
|
Availability
|
Detailed explanation-1: -Explanation: The key element, authenticity helps in assuring the fact that the information is from the original source.
Detailed explanation-2: -The property of being genuine and being able to be verified and trusted; confidence in the validity of a transmission, a message, or message originator.
Detailed explanation-3: -Answer: B) The term which denotes that only authorized users are capable of accessing the information is known as availability.
Detailed explanation-4: -Confidentiality: Only authorized users and processes should be able to access or modify data.
Detailed explanation-5: -Authentication refers to a rule of evidence which requires that evidence must be sufficient to support a finding that the matter in question is what its proponent claims. The “authenticity” rule relates to whether the subject of an evidentiary offering (generally a tangible thing), is what it purports to be.