List and describe the three characteristics of information that must be protected by information security?
What will be an ideal response?
Confidentiality-Confidentiality ensures that only authorized parties can view information.
Integrity-Integrity ensures that the information is correct and that no unauthorized person or malicious software program has altered that data.
Availability-Although a secure computer must restrict access attempts by unauthorized users, it must still make the data available to authorized users.
You might also like to view...
A workbook is the primary document used in Excel to save and work with the data arranged in columns and rows
Indicate whether the statement is true or false
By default, Excel 2013 files are saved in the native Microsoft Excel Workbook file format with the following file extension:
A) .xlsx B) .xlsd C) .csv D) .xls
The Database Splitter splits an Access database into two separate files. One file contains queries, forms, reports, and other database objects and the other file contains the database ____.
A. tables B. modules C. macros D. database tools
Which type of network consists of a group of clients and servers under the control of one central security database?
a. Domain b. Homegroup c. IEEE 802.11 d. Workgroup