Privacy and Security in eConestoga

TantalizingAcer8735 avatar
TantalizingAcer8735
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is the concept that allows parents to access their child's grades in eConestoga?

Permissions

Data integrity ensures that data is available to everyone.

False

What could be the consequences if another student was able to 'hack' into eConestoga and change your grades?

Inaccurate grades, loss of trust in the system, and potential academic consequences

The CIA triad consists of _______________, _______________, and _______________.

<p>Confidentiality, Integrity, Availability</p> Signup and view all the answers

What is the purpose of backups in ensuring availability?

<p>To prevent data loss in case of a system failure</p> Signup and view all the answers

Security is only concerned with protecting computer systems.

<p>False</p> Signup and view all the answers

What is the balance between prevention and detection in security?

<p>Prevention aims to stop security breaches before they occur, while detection alerts us once a breach has occurred.</p> Signup and view all the answers

Match the security concept with its description:

<p>Confidentiality = Ensuring that information is only accessible to authorized individuals Integrity = Ensuring that data has not been changed inappropriately Availability = Ensuring that a computer resource is accessible when needed</p> Signup and view all the answers

What is the main concern in the scenario where eConestoga is taken down in an apparent DDOS attack?

<p>Availability</p> Signup and view all the answers

Where do you foresee the Internet/computing evolving into over the next 5-10 years?

<p>Answers will vary, but possible answers include increased use of AI, IoT, and cloud computing.</p> Signup and view all the answers

Study Notes

Confidentiality

  • Ensuring the correct information is in use
  • Data integrity: preventing unauthorized changes to data
  • Example: if another student hacked into eConestoga and changed your grades

Integrity

  • The ability to access a computer resource
  • Importance of access varies depending on the domain (e.g., library resource, hospital system)
  • Consequences of unavailable resources: impact on security
  • Example: if eConestoga was taken down in an apparent DDOS attack and you had an assignment due

Availability

  • Effort can be divided into two areas: prevention and detection
  • Prevention: stopping security breaches before they occur (e.g., username/password)
  • Detection: alerting once a breach has occurred (e.g., burglar alarm)
  • Safeguards: backups, network monitoring tools, and redundant pairs

CIA (Confidentiality, Integrity, Availability)

  • Heavily dependent on domain requirements
  • Balance between prevention and detection is crucial
  • Security is a vast topic that goes beyond computer systems to include users and environment
  • Many principles guide decision-making, with no one correct answer
  • CIA provides a guide to what to protect and prioritize

Future of Computing and Security

  • The Internet and computing have expanded greatly since their humble beginnings
  • Current trend: smart devices (e.g., smart phones, cars, watches, homes)
  • Foreseeing the future of computing/internet: next 5-10 years
  • Potential security issues: various areas to consider and prepare for

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Quizzes Like This

Data Security Principles Quiz
0 questions
Data and System Integrity
18 questions
أمان الهواتف
26 questions

أمان الهواتف

ArticulateEmpowerment avatar
ArticulateEmpowerment
Use Quizgecko on...
Browser
Browser