Three protections must be incorporated over information. They are confidentiality, integrity and availability. Confidentiality makes sure that only approved people can view important information.
Confidentiality is the answer.
Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it?
Which act requires enterprises to guard protected health information and implement policies and procedures to safeguard it? Health Insurance Portability and Accountability Act (HIPAA).
Which Act requires banks and financial institutions to alert their customers of their policies?
Gramm-Leach-Bliley (GLBA) demands that banks and financial institutions should notify customers about their policies in revealing customer information and to safeguard all electronic and paper documents holding personally identifiable financial information. Hence option (b) is the correct answer.
Confidentiality. Ensures that data is accessed only by authorized users with the proper credentials.
integrity. Security actions that ensure that the information is correct and no unauthorized person or malicious software has altered the data.
Which is a type of virus that infects an executable program file?
File viruses are commonly found in executable files such as .exe, . vbs or a .com files. If you run an executable file that is infected with a file virus, it can potentially enter your computer’s memory and subsequently run your computer.
Is a flaw or weakness that allows a threat agent to bypass security?
|threat liklihood||the probability that a threat will actually occur|
|threat vector||the means by which an attack could occur|
|transference||transferring the risk to a third party|
|vulnerability||a flaw or weakness that allows a threat agent to bypass security.|
Why are long passwords stronger than short passwords?
Why are long passwords stronger than short passwords? Long passwords are confusing to attackers who cannot read them. Short passwords take up less storage space which makes them easier to break. Long passwords require attackers to make many more attempts to uncover the password.
Authorization and authentication are not required for an entity to access unprotected resources. … This ensures that only authorized users can modify data. Confidentiality, or data privacy: The means used to ensure that information is made available only to users who are authorized to access it.
What is it called when a user makes a typing error when entering a URL that takes him to an imposter website?
what is it called when a user makes a typing error when entering a URL that takes him to an imposter website? Typo squatting.
How can an attacker use a hoax quizlet?
How can an attacker use a hoax? By sending out a hoax, an attacker can convince a user to read his email more often. A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings. A user who receives multiple hoaxes could contact his supervisor for help.