Start learning 50% faster. Sign in now
The confidentiality principle ensures that sensitive information is only accessible to authorized users. Data exfiltration violates this principle, as attackers accessed private customer information without permission. Maintaining confidentiality involves: 1. Encryption to secure data at rest and in transit. 2. Access controls to restrict unauthorized users. 3. Regular audits to identify potential vulnerabilities. Since the attackers didn’t alter the data, integrity and availability remain intact, making confidentiality the primary concern. Why Other Options Are Incorrect: • B) Integrity: Incorrect because the data wasn’t modified. • C) Availability: The system remained operational and accessible. • D) Authentication: Focuses on verifying user identity but isn’t directly violated here. • E) Non-repudiation: This principle isn’t relevant to data theft scenarios.
System software
The device which store information and are used by the computer for its working are called
_______ is a display space and the colour for each pixel or "bit" in the display space.
What is the term for a machine that contacts a server for information?
What's the name of the technology that the Chrome browser uses to keep you safe from malware and phishing?
Which of the following statement is true about Firewall?
Speed of 1,000,000,000 periods per second in computer terms is equivalent to:
DSL is used in _________ connections.
Which of the following is a pointing device?
Which of the following is used in second generation computer?