SOFTWARE ENGINEERING

EMERGING TRENDS IN SOFTWARE ENGINEERING

CLOUD COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
How can confidentiality of information be achieved?
A
By ensuring enough resources to make information available for all users
B
By preventing unauthorized changes
C
By regularly backing up the information
D
By restricting access to information
Explanation: 

Detailed explanation-1: -To ensure that data can only be accessed by authorized users who have obtained access permission from the data owner, symmetric or asymmetric encryption has been regarded as a common method to achieve confidentiality.

Detailed explanation-2: -What are examples of Confidential Information? Examples of confidential information include a person’s phone number and address, medical records, and social security. Companies also have confidential information such as financial records, trade secrets, customer information, and marketing strategies.

Detailed explanation-3: -Confidential computing is a cloud computing technology that isolates sensitive data in a protected CPU enclave during processing.

There is 1 question to complete.