During routine auditing of the database, the following records are found: UserID Address Credit Card No. Password tjones123 elm street 55XX-XXX-XXXX-1397 Password100 mdoe234 pine street 42XX-XXX-XXXX-2027 17DEC12 Which of the following is the BIGGEST security concern?

A. integrity
B. availability
C. confidentiality
D. assurance


C
Explanation: The passwords are being stored in clear text, as well as the street names and user IDs

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. A function prototype specified the function operation. 2. The return statement may be omitted from a function’s body if the function does not return a result. 3. The relative order that functions are defined affects their order of execution. 4. Functions do not need comments. 5. Reusing function subprograms is a bad idea.

Computer Science & Information Technology

What is the difference between writing in linear fashion and writing in sequential fashion?

What will be an ideal response?

Computer Science & Information Technology

One advantage of the waterfall system development process is that formal reviews at the end of each phase allows maximum _____ control.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Adding a password and encryption to a database requires the database to be opened in ________ mode.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology