Podcast
Questions and Answers
Information should be available wherever and whenever required within a time limit specified.
Information should be available wherever and whenever required within a time limit specified.
Availability
There should be a mechanism to authenticate a user before giving him/her an access to the required information.
There should be a mechanism to authenticate a user before giving him/her an access to the required information.
Authenticity
It is the protection against the denial of order or denial of payment. Once a sender sends a message, the sender should not be able to deny sending the message. Similarly, the recipient of message should not be able to deny the receipt
It is the protection against the denial of order or denial of payment. Once a sender sends a message, the sender should not be able to deny sending the message. Similarly, the recipient of message should not be able to deny the receipt
Non-Repudiability
Data should be recorded in such a way that it can be audited for integrity requirements.
Data should be recorded in such a way that it can be audited for integrity requirements.
Information should not be accessible to an unauthorized person. It should not be intercepted during the transmission.
Information should not be accessible to an unauthorized person. It should not be intercepted during the transmission.
Information should not be altered during its transmission over the network.
Information should not be altered during its transmission over the network.
It is an essential part of any transaction that takes place over the internet. Customers will lose his/her faith in e-business if its security is compromised.
It is an essential part of any transaction that takes place over the internet. Customers will lose his/her faith in e-business if its security is compromised.
Information should be encrypted and decrypted only by an authorized user.
Information should be encrypted and decrypted only by an authorized user.
It is a very effective and practical way to safeguard the data being transmitted over
the network.
It is a very effective and practical way to safeguard the data being transmitted over the network.
Ensures the authenticity of the information through encryption and password.
Ensures the authenticity of the information through encryption and password.
It is a unique digital id used to verify the identity of an individual website or user.
It is a unique digital id used to verify the identity of an individual website or user.
Hackers can easily create fake versions of legitimate websites without incurring any cost
Hackers can easily create fake versions of legitimate websites without incurring any cost
Some fraudsters change the content of a website. Their goal is usually to either divert traffic to a competing website or destroy the affected company’s reputation.
Some fraudsters change the content of a website. Their goal is usually to either divert traffic to a competing website or destroy the affected company’s reputation.
Flashcards
Availability
Availability
Information must be accessible when and where needed, within a given time limit.
Authenticity
Authenticity
Users must be verified before accessing information.
Non-Repudiation
Non-Repudiation
Preventing sender or recipient from denying actions related to information exchange.
Auditability
Auditability
Signup and view all the flashcards
Confidentiality
Confidentiality
Signup and view all the flashcards
Integrity
Integrity
Signup and view all the flashcards
Security
Security
Signup and view all the flashcards
Encryption
Encryption
Signup and view all the flashcards
Digital Signature
Digital Signature
Signup and view all the flashcards
Security Certificates
Security Certificates
Signup and view all the flashcards
Counterfeit Sites
Counterfeit Sites
Signup and view all the flashcards
Malicious Alterations
Malicious Alterations
Signup and view all the flashcards