Which of the following can be used to protect confidentiality? (a) CCTV (b) Encryption (c) checksums (d) RAID. The art of preventing unwanted access, use, disclosure, interruption, alteration, inspection, recording, or destruction of information is known as information security. It is a technique for protecting data and information systems against unauthorized users, harmful malware, and intrusions. The three stages of information security are confidentiality, integrity, and availability.
Answer and Explanation: 1
Answer: (b) Encryption Information is protected using encryption and decryption methods and a conversion algorithm. It is a technique for protecting... See full answer below.
Data confidentiality is about protecting data against unintentional, unlawful, or unauthorized access, disclosure, or theft. Confidentiality has to do with the privacy of information, including authorizations to view, share, and use it. Information with low confidentiality concerns may be considered "public" or otherwise not threatening if exposed beyond its intended audience. Information with high confidentiality concerns is considered secret and must be kept confidential to prevent identity theft, compromise of accounts and systems, legal or reputational damage, and other severe consequences. Examples of data with high confidentiality concerns include:
Consider the following when managing data confidentiality:
When managing data confidentiality, follow these guidelines:
Last Updated on October 29, 2019 by Admin
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
|