EMERGING TRENDS IN SOFTWARE ENGINEERING
CLOUD COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
How can confidentiality of information be achieved?
|
By ensuring enough resources to make information available for all users
|
|
By preventing unauthorized changes
|
|
By regularly backing up the information
|
|
By restricting access to information
|
Explanation:
Detailed explanation-1: -To ensure that data can only be accessed by authorized users who have obtained access permission from the data owner, symmetric or asymmetric encryption has been regarded as a common method to achieve confidentiality.
Detailed explanation-2: -What are examples of Confidential Information? Examples of confidential information include a person’s phone number and address, medical records, and social security. Companies also have confidential information such as financial records, trade secrets, customer information, and marketing strategies.
Detailed explanation-3: -Confidential computing is a cloud computing technology that isolates sensitive data in a protected CPU enclave during processing.
There is 1 question to complete.