Podcast
Questions and Answers
Information should be available wherever and whenever required within a time limit specified.
Information should be available wherever and whenever required within a time limit specified.
Availability
There should be a mechanism to authenticate a user before giving him/her an access to the required information.
There should be a mechanism to authenticate a user before giving him/her an access to the required information.
Authenticity
It is the protection against the denial of order or denial of payment. Once a sender sends a message, the sender should not be able to deny sending the message. Similarly, the recipient of message should not be able to deny the receipt
It is the protection against the denial of order or denial of payment. Once a sender sends a message, the sender should not be able to deny sending the message. Similarly, the recipient of message should not be able to deny the receipt
Non-Repudiability
Data should be recorded in such a way that it can be audited for integrity requirements.
Data should be recorded in such a way that it can be audited for integrity requirements.
Signup and view all the answers
Information should not be accessible to an unauthorized person. It should not be intercepted during the transmission.
Information should not be accessible to an unauthorized person. It should not be intercepted during the transmission.
Signup and view all the answers
Information should not be altered during its transmission over the network.
Information should not be altered during its transmission over the network.
Signup and view all the answers
It is an essential part of any transaction that takes place over the internet. Customers will lose his/her faith in e-business if its security is compromised.
It is an essential part of any transaction that takes place over the internet. Customers will lose his/her faith in e-business if its security is compromised.
Signup and view all the answers
Information should be encrypted and decrypted only by an authorized user.
Information should be encrypted and decrypted only by an authorized user.
Signup and view all the answers
It is a very effective and practical way to safeguard the data being transmitted over
the network.
It is a very effective and practical way to safeguard the data being transmitted over the network.
Signup and view all the answers
Ensures the authenticity of the information through encryption and password.
Ensures the authenticity of the information through encryption and password.
Signup and view all the answers
It is a unique digital id used to verify the identity of an individual website or user.
It is a unique digital id used to verify the identity of an individual website or user.
Signup and view all the answers
Hackers can easily create fake versions of legitimate websites without incurring any cost
Hackers can easily create fake versions of legitimate websites without incurring any cost
Signup and view all the answers
Some fraudsters change the content of a website. Their goal is usually to either divert traffic to a competing website or destroy the affected company’s reputation.
Some fraudsters change the content of a website. Their goal is usually to either divert traffic to a competing website or destroy the affected company’s reputation.
Signup and view all the answers