COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Professional certification for those with strong managerial background and technical expertise.
|
|
The three underlying principles of data protection:confidentiality, integrity, and availability.
|
|
Describes the connection of nontraditional computing devices to the Internet.
|
|
The avenue or path the hacker uses to commit the attack.
|
Detailed explanation-1: -The three letters in “CIA triad” stand for Confidentiality, Integrity, and Availability. The CIA triad is a common model that forms the basis for the development of security systems. They are used for finding vulnerabilities and methods for creating solutions.
Detailed explanation-2: -Confidentiality-You need to know your data is protected from unauthorized access. Integrity-You have to be able to trust your data. Availability-You need to be able to access your data.
Detailed explanation-3: -Confidentiality is the ability to hide information from those people unauthorised to view it. It is perhaps the most obvious aspect of the CIA triad when it comes to security; but correspondingly, it is also the one which is attacked most often.
Detailed explanation-4: -The three fundamental bases of information security are represented in the CIA triad: confidentiality, integrity and availability. Put simply, confidentiality is limiting data access, integrity is ensuring your data is accurate, and availability is making sure it is accessible to those who need it.