
A, Confidentiality; is a set of rules that limits access to information. Confidentiality prevents sensitive information from reaching the wrong people, while making sure that the right people can get it. Some methods used to ensure confidentiality include data encryption, passwords, two-factor authentication and biometric verification.
B, Integrity; is the assurance that the information is trustworthy and accurate. Integrity involves maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle. Data must not be changed whilst being transmitted. Steps must be taken to ensure that data cannot be altered by unauthorized people. In addition, processes must be in place to detect any changes in data that might occur as a result of computer failure (e.g. server crash). Backup copies of data must be available to restore data when this is damaged, changed or lost.
C, Availability of information; refers to ensuring that authorized people are able to access the information when needed. Information is unavailable when it is lost, or when access to it is denied or delayed. For example, information on a website may not be readily available to users because the web server is over loaded by a denial-of-service attack. Measures to ensure that information is available include regular maintenance of hardware, implementing emergency backup power (e.g. uninterruptible power supply & generators), keeping offsite backup of data, providing adequate communications bandwidth, guarding against denial-of-service (DoS) attacks.
Dominic M answered the question on May 16, 2018 at 07:55
-
Giving examples explain threats to data security
(Solved)
Giving examples explain threats to data security.
Date posted:
May 16, 2018
.
Answers (1)
-
What is a cyber crime?
(Solved)
What is a cyber crime?
Date posted:
May 16, 2018
.
Answers (1)
-
Describe the difference between an internal and an external hyperlink
(Solved)
Describe the difference between an internal and an external hyperlink
Date posted:
May 14, 2018
.
Answers (1)
-
What’s the difference between encoding, encryption, and hashing?
(Solved)
What’s the difference between encoding, encryption, and hashing?
Date posted:
May 13, 2018
.
Answers (1)
-
Expand on Claude Shannon’s theorem. Differentiate the term confusion and diffusion as envisaged by Shannon to strengthen crypto-algorithm.
(Solved)
Expand on Claude Shannon’s theorem. Differentiate the term confusion and diffusion as envisaged by Shannon to strengthen crypto-algorithm.
Date posted:
May 13, 2018
.
Answers (1)
-
In DES, the encryption and decryption algorithms are the same. Is that also the case in AES?
(Solved)
In DES, the encryption and decryption algorithms are the same. Is that also the case in AES?
Date posted:
May 13, 2018
.
Answers (1)
-
What do we mean by public-key cryptography?
(Solved)
What do we mean by public-key cryptography?
Date posted:
May 13, 2018
.
Answers (1)
-
What is a certificate and why are certificates needed in public key cryptography?
(Solved)
What is a certificate and why are certificates needed in public key cryptography?
Date posted:
May 13, 2018
.
Answers (1)
-
To illustrate exactly when an object is constructed and destructed when returned from a function, create a C++ class called who. Have who's constructor take...
(Solved)
To illustrate exactly when an object is constructed and destructed when returned from a function, create a C++ class called who. Have who's constructor take one character argument that will be used to identify an object.Have the constructor display a message similar to this when constructing an object:
Constructing who #X
where x is the identifying character associated with each object when an object is destroyed, have a message similar to this displayed:
Destroying who #x
where, again, x is the identifying character. Finally, create a function called make_who() that returns a who object. Give each object a unique name.Note the output displayed by the program.
Date posted:
May 12, 2018
.
Answers (1)
-
other than the incorrect freeing of dynamically allocated memory, think of a situation in which it would be improper to return an object from a...
(Solved)
other than the incorrect freeing of dynamically allocated memory, think of a situation in which it would be improper to return an object from a function.
Date posted:
May 12, 2018
.
Answers (1)
-
As you know, when an object is passed to a function, a copy of that object is made.Further, when that function returns, the copy's destructor...
(Solved)
As you know, when an object is passed to a function, a copy of that object is made.Further, when that function returns, the copy's destructor function is called.Keeping this in mind, what is wrong with the following program?
// This program contains an error.
#include
#include
using namespace std;
class dyna {
int *p;
public:
dyna(int i);
~dyna() { free(p); cout << "freeing \n"; }
int get() { return *p; }
};
dyna::dy*) malloc(sizeof(int));
if(!p) {
cout << "Allocation failure\";
exit(1);
}
*p = i;
}
// Return negative value of *ob.p
int neg(dyna ob)
{
retur.get();
}
int main()
{
dyna 0(-10);
cout << o.get() << "\n";
cout << neg(o) << "\n";
dyna o2(20);
cout << o2.get () << "\n";
cout << neg (o2)\n";
cout << o.get () << "\n";
cout << neg (o) << "\n";
return 0;
}
Date posted:
May 12, 2018
.
Answers (1)
-
If a queue dynamically allocates memory to hold the queue, explain the reason for that occurence and state whether in such a situation it...
(Solved)
If a queue dynamically allocates memory to hold the queue, explain the reason for that occurence and state whether in such a situation it is possible to block one queue from being assigned to another.
Date posted:
May 12, 2018
.
Answers (1)
-
Create a class called dice that contains one private integer variable.Create a function called roll() that uses the standard randomn number generator, rand(), to generate...
(Solved)
Create a class called dice that contains one private integer variable.Create a function called roll() that uses the standard randomn number generator, rand(), to generate a number between 1 and 6. Then have roll() display that value.
Date posted:
May 12, 2018
.
Answers (1)
-
Create a class called prompt in C++ language.Pass its constructor function a prompting string of your choice.Have the constructor display the string and then input...
(Solved)
Create a class called prompt in C++ language.Pass its constructor function a prompting string of your choice.Have the constructor display the string and then input an integer.Store this value in a private variable called count.When an object of type prompt is destroyed, ring the bell on the terminal as many times as the user entered.
Date posted:
May 12, 2018
.
Answers (1)
-
Create a C++ class called line that draws a line on the screen.Store the line length in a private integer variable called len.Have line's constructor...
(Solved)
Create a C++ class called line that draws a line on the screen.Store the line length in a private integer variable called len.Have line's constructor take one parameter: the line length.Have the constructor store the length and actually draw the line .If the system does not support graphics, display the line by using *. Give the line a destructor that erases the line.
Date posted:
May 12, 2018
.
Answers (1)
-
Explain what an anonymous union is and how it differs from a normal union.
(Solved)
Explain what an anonymous union is and how it differs from a normal union.
Date posted:
May 12, 2018
.
Answers (1)
-
Use a C++ union class to swap the low- and high-order bytes of an integer (assuming 16-bit integer; if the computer uses 32-bit integers, swap...
(Solved)
Use a C++ union class to swap the low- and high-order bytes of an integer (assuming 16-bit integer; if the computer uses 32-bit integers, swap the bytes of a short int)
Date posted:
May 12, 2018
.
Answers (1)
-
Given the following base C++ class,
class area_cl {
public:
double height;
double width;
};
Create two derived classes called rectangle and isosceles that inherit area_cl. Have each class include a...
(Solved)
Given the following base C++ class,
class area_cl {
public:
double height;
double width;
};
Create two derived classes called rectangle and isosceles that inherit area_cl. Have each class include a function called area()
that returns the area of a rectangle or isosceles triangle, as appropriate. Use parameterized constructors to initialize height and width.
Date posted:
May 12, 2018
.
Answers (1)
-
Difference between Virus and Trojan
(Solved)
Difference between Virus and Trojan
Date posted:
May 12, 2018
.
Answers (1)
-
Under network security infrastructure, what do you understand by term Vulnerability (or Weakness)?
(Solved)
Under network security infrastructure, what do you understand by term Vulnerability (or Weakness)?
Date posted:
May 12, 2018
.
Answers (1)