Podcast
Questions and Answers
What does data integrity ensure?
What does data integrity ensure?
- Individuals control what information related to them may be collected and stored
- Systems work promptly and service is not denied to authorized users
- Information is not made available to unauthorized individuals
- Information and programs are changed only in a specified and authorized manner (correct)
What does authenticity refer to in computer security?
What does authenticity refer to in computer security?
- Being genuine and verifiable, ensuring confidence in the validity of a transmission or message originator (correct)
- Assuring that systems perform their intended function in an unimpaired manner
- Ensuring that private or confidential information is not made available to unauthorized individuals
- Assuring that individuals control or influence what information related to them may be collected and stored
What is the primary focus of data confidentiality?
What is the primary focus of data confidentiality?
- Assuring that private or confidential information is not made available or disclosed to unauthorized individuals (correct)
- Assuring that systems work promptly and service is not denied to authorized users
- Assuring that information and programs are changed only in a specified and authorized manner
- Assuring that individuals control or influence what information related to them may be collected and stored
What does privacy in computer security aim to achieve?
What does privacy in computer security aim to achieve?
What does system integrity ensure in computer security?
What does system integrity ensure in computer security?
Flashcards are hidden until you start studying
Study Notes
Introduction to Network Security
- The field of network and Internet security involves measures to: • deter security violations • prevent security violations • detect security violations • correct security violations • that involve the transmission of information
Computer Security
- The NIST Computer Security Handbook defines computer security as: • the protection afforded to an automated information system • to attain the applicable objectives of: • preserving the integrity of information system resources • preserving the availability of information system resources • preserving the confidentiality of information system resources
- Information system resources include: • hardware • software • firmware • information/data • telecommunications
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.