In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

Answers

Answer 1

Answer:

Confidentiality

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cybersecurity, there are certain security standards, frameworks, antivirus utility, and best practices that must be adopted to ensure there's a formidable wall to prevent data corruption by malwares or viruses, protect data and any unauthorized access or usage of the system network.

In the context of computer and network security, confidentiality simply means that a computer system used for performing certain functions such as exchange of data must not allow the disclosing of information to and by anyone who is not authorized to access it.

Confidentiality refers to the act of sharing an information that is expected to be kept secret, especially between the parties involved. Thus, a confidential information is a secret information that mustn't be shared with the general public.

In conclusion, confidentiality requires that access to collected data be limited only to authorized staffs or persons.


Related Questions

What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes

Answers

Answer:

metasploit.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.

Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.

What temperature is most commonly used in autoclaves to sterilize growth media and other devices prior to experimentation

Answers

Answer:

The most effective temparature used in autoclave is 121°C

In contrast to data in a database, data in a data warehouse is described as subject oriented, which means that it _____.

Answers

Answer:

focuses on a certain subject

Explanation:

it means that it focuses on that one subject and none others

Hope it helps c:

The DuPage Freight Shipping Company charges the following rates: Weight of Package Rate per Pound 2 pounds or less $1.10 Over 2 pounds, but not more than 6 pounds $2.20 Over 6 pounds, but not more than 10 pounds $3.70 Over 10 pounds $3.80 Design a program that does the following: asks the user to enter the weight of a package and displays the shipping charges. 1. Prompt the user for the weight of a package 2. Determines the rate per pound in a getRate module 3. Calculates and displays the total shipping charge in a getTotal module Hint - you may want to use a global variable for this! Please submit three things:

Answers

Answer:

The program in Python is as follows:

def getRate(weight):

   if weight<=2.0:

       rate = 1.10

   elif weight>2 and weight<=6:

       rate = 2.20

   elif weight>6 and weight<=10:

       rate = 3.70

   else:

       rate = 3.80

   return rate

def getTotal(weight,rate):

   total = weight * rate

   print("Total: ",total)

weight = float(input("Weight: "))

rate = getRate(weight)

getTotal(weight,rate)

Explanation:

This defines the getRate function

def getRate(weight):

The following if conditions determine the corresponding rate based on the value of weight passed to the function

   if weight<=2.0:

       rate = 1.10

   elif weight>2 and weight<=6:

       rate = 2.20

   elif weight>6 and weight<=10:

       rate = 3.70

   else:

       rate = 3.80

This returns the rate back to the main method

   return rate

The getTotal module begins here

def getTotal(weight,rate):

This calculates the total charges

   total = weight * rate

This prints the calculated total

   print("Total: ",total)

The main begins here

This gets input for weight

weight = float(input("Weight: "))

This gets the rate from the getRate function

rate = getRate(weight)

This passes values to the getTotal function

getTotal(weight,rate)

Determine whether the phrase below is a sentence or a fragment.

While we were in Greece, we ate a lot of feta cheese.
a.
Sentence
b.
Fragment

Answers

sentence.


i believe it is sentence

which one of the following is not hardware​

Answers

Firewall is not hardware. It is only software.

Answer:

There r no options

Explanation:

I think the application r not the hardware.

Other Questions
what operation can be performed using the total feature Find the value of x that will make A||B. Please help! pls help I only have 22 minsGenerally, how many people traveled together in a wagon train?A) 4 or 5 familiesB) up to 50 peopleC) up to 70 familiesD) no more than 70 people Capital allocation line is _______________ Question 18 options: plot of risk-return combinations available by varying portfolio allocation between a risk-free rate and a risky portfolio None of the options are correct plot of risk-return combinations available by varying portfolio allocation between two risky assets plot of risk-return combinations available by equal weighting allocation between a risk-free rate and a risky portfolio the lines given by the equations y=6x and y=6x+2 are ____ hamood spelled backwards is hamood also let me know if u want my account by 12 AM PDT 6/2/21 Are the triangles similar ? If they are identify the similarity ratio. Quote of the day-"Just remember, without discipline, a clear strategy, and a concise plan, the speculator will fall into all the emotional pitfalls of the market - jump from one stock to another, hold a losing position too long, and cut out of a winner too soon, for no reason other than fear of losing profit. Greed, Fear, Impatience, Ignorance, and Hope will all fight for mental dominance over the speculator. Then, after a few failures and catastrophes the speculator may become demoralised, depressed, despondent, and abandon the market and the chance to make a fortune from what the market has to offer."-Jesse Lauriston Livermore What should the follow equations is equivalent to 6.87p+9.2=-7.056 Which line could be added to the lesson plan to strengthen the teachers point?Different languages and communication styles might hinder your ability to benefit from global learning.The digital divide will likely prevent you from having a major impact in the global communications environment.Language and cultural differences will likely make it too frustrating to have an effective learning experience.Learning in a global community enables you to expand your horizons and learn new languages. given the figure below, what is the value of x? The carnivals in Quebec and Louisiana are more similar than different. Pls answer 13 b ill mark u brainlist Notice that real GDP trends upward over time but experiences ups and downs in the short run. A period of declining real GDP, such as the blue-shaded period in 1957, is known as . True or False: Small ups and downs in real GDP follow a consistent, predictable pattern. True False Which of the following probably occurred as the U.S. economy experienced declining real GDP in 1957 what graph shows the solution to the equation below log3(x+2)=1 2. As NH4OH is added to an HCl solution, the pH of the solutionA) increases as the OH- concentration decreasesB ) increases as the OH- concentration increasesC ) decreases as the OH- concentration decreasesD ) decreases as the OH- ion concentration increases Find all solutions to the equationin the interval [0, 21). Enter thesolutions in increasing order.sin 2x = 2 sin xx = [?],[1]TTRemember: sin 20 = 2 sin 0 cos 0 The capital asset pricing model (CAPM) is based on the premise that: Group of answer choices Neither systematic nor unsystematic variability in cash flows is relevant. Only systematic variability in cash flows is relevant. Only unsystematic variability in cash flows is relevant. Both systematic and unsystematic variability in cash flows are relevant. A marble is rolling across a smooth 1.2 m tall table at a velocity of 3 m/s. How far from the edge of the table does it land? (SHOW ALL OF YOUR WORK) Jamal opens a savings account with a starting balance of $200 and plans todeposit $75 each week after opening the account. His savings over time isrepresented by the graph below. How would this graph change if Jamaldecided to deposit $100 each week instead?