Acme Widgets recently experienced an attack in which the attacker broke into a file server and stole product plans. Which of the following is a goal of information security that was violated?
What will be an ideal response?
Confidentiality
Computer Science & Information Technology
You might also like to view...
__________ is not an example of a network transmission medium.
a) Water b) Copper wiring c) Optical fiber d) Air
Computer Science & Information Technology
As shown in the accompanying figure, a(n) ____________________ is a horizontal group of cells.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The number of bits processed at one time is the processor's
A) Letter size B) Word size C) Paragraph size D) Page size
Computer Science & Information Technology
BitLocker uses the __________to provide secure protection of encryption keys and checking of key components when Windows is booting
a. Trusted Platform Module b. USB port c. NTFS file system d. None of the above
Computer Science & Information Technology