List and describe the three characteristics of information that must be protected by information security?

What will be an ideal response?


Confidentiality-Confidentiality ensures that only authorized parties can view information.
Integrity-Integrity ensures that the information is correct and that no unauthorized person or malicious software program has altered that data.
Availability-Although a secure computer must restrict access attempts by unauthorized users, it must still make the data available to authorized users.

Computer Science & Information Technology

You might also like to view...

A workbook is the primary document used in Excel to save and work with the data arranged in columns and rows

Indicate whether the statement is true or false

Computer Science & Information Technology

By default, Excel 2013 files are saved in the native Microsoft Excel Workbook file format with the following file extension:

A) .xlsx B) .xlsd C) .csv D) .xls

Computer Science & Information Technology

The Database Splitter splits an Access database into two separate files.  One file contains queries, forms, reports, and other database objects and the other file contains the database ____.

A. tables B. modules C. macros D. database tools

Computer Science & Information Technology

Which type of network consists of a group of clients and servers under the control of one central security database?

a. Domain b. Homegroup c. IEEE 802.11 d. Workgroup

Computer Science & Information Technology