"The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources" is the definition of _________ .

Fill in the blank(s) with the appropriate word(s).


computer security

Computer Science & Information Technology

You might also like to view...

A comment in Word displays either in a balloon-shaped graphic in the margin of the document or in a ________ at the bottom or side of the document

A) Reviewing window B) User Reviews pane C) Comment window D) Reviewing pane

Computer Science & Information Technology

List three ways to connect just two computers.

What will be an ideal response?

Computer Science & Information Technology

Before you run a password cracking program on your company’s computers to check for weak passwords, what should you do?

A. Tell all employees B. Disable all accounts C. Get permission from management D. Change all passwords

Computer Science & Information Technology

Which of the following statements is true of domain names??

A. ?A domain name is the Internet Protocol (IP) address of a website. B. ?A common domain name can make it easier for visitors to find webpages. C. ?A short domain name makes it more memorable. D. ?A domain name with hyphens is easier to pronounce.

Computer Science & Information Technology