Privacy and Security in eConestoga
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the concept that allows parents to access their child's grades in eConestoga?

  • Confidentiality
  • Permissions (correct)
  • Availability
  • Data Integrity
  • Data integrity ensures that data is available to everyone.

    False

    What could be the consequences if another student was able to 'hack' into eConestoga and change your grades?

    Inaccurate grades, loss of trust in the system, and potential academic consequences

    The CIA triad consists of _______________, _______________, and _______________.

    <p>Confidentiality, Integrity, Availability</p> Signup and view all the answers

    What is the purpose of backups in ensuring availability?

    <p>To prevent data loss in case of a system failure</p> Signup and view all the answers

    Security is only concerned with protecting computer systems.

    <p>False</p> Signup and view all the answers

    What is the balance between prevention and detection in security?

    <p>Prevention aims to stop security breaches before they occur, while detection alerts us once a breach has occurred.</p> Signup and view all the answers

    Match the security concept with its description:

    <p>Confidentiality = Ensuring that information is only accessible to authorized individuals Integrity = Ensuring that data has not been changed inappropriately Availability = Ensuring that a computer resource is accessible when needed</p> Signup and view all the answers

    What is the main concern in the scenario where eConestoga is taken down in an apparent DDOS attack?

    <p>Availability</p> Signup and view all the answers

    Where do you foresee the Internet/computing evolving into over the next 5-10 years?

    <p>Answers will vary, but possible answers include increased use of AI, IoT, and cloud computing.</p> Signup and view all the answers

    Study Notes

    Confidentiality

    • Ensuring the correct information is in use
    • Data integrity: preventing unauthorized changes to data
    • Example: if another student hacked into eConestoga and changed your grades

    Integrity

    • The ability to access a computer resource
    • Importance of access varies depending on the domain (e.g., library resource, hospital system)
    • Consequences of unavailable resources: impact on security
    • Example: if eConestoga was taken down in an apparent DDOS attack and you had an assignment due

    Availability

    • Effort can be divided into two areas: prevention and detection
    • Prevention: stopping security breaches before they occur (e.g., username/password)
    • Detection: alerting once a breach has occurred (e.g., burglar alarm)
    • Safeguards: backups, network monitoring tools, and redundant pairs

    CIA (Confidentiality, Integrity, Availability)

    • Heavily dependent on domain requirements
    • Balance between prevention and detection is crucial
    • Security is a vast topic that goes beyond computer systems to include users and environment
    • Many principles guide decision-making, with no one correct answer
    • CIA provides a guide to what to protect and prioritize

    Future of Computing and Security

    • The Internet and computing have expanded greatly since their humble beginnings
    • Current trend: smart devices (e.g., smart phones, cars, watches, homes)
    • Foreseeing the future of computing/internet: next 5-10 years
    • Potential security issues: various areas to consider and prepare for

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Understanding the importance of confidentiality, integrity and permissions in maintaining the security of personal grades and data in eConestoga.

    More Like This

    Computer Security Basics
    15 questions
    أمان الهواتف
    26 questions

    أمان الهواتف

    ArticulateEmpowerment avatar
    ArticulateEmpowerment
    Business Information Management - Week 9
    48 questions
    Use Quizgecko on...
    Browser
    Browser