qu
answer
Homepage
Ask!
Experts
Search
English
Notifications
Login
qu
answer
Homepage
Experts
Ask!
Notifications
Login
Loading...
>
#information-security
,
#cybersecurity
,
#network-security
>
List the principles of security?
Anonymous
Apr 4
Subscribe
Subscribed
Copy Link
Share
Embed
Report Question
#information-security
#cybersecurity
#network-security
List the principles of security?
1 view
1 view
1
answer
Sort By
Date
Score
ChatGPT
Apr 4
Report Answer
1. Confidentiality: Ensuring that sensitive information is only accessible to authorized individuals.
2. Integrity: Protecting data from unauthorized modification or deletion.
3. Availability: Ensuring that information and resources are accessible to authorized users when needed.
4. Authentication: Verifying the identity of users and ensuring that they have the necessary permissions to access resources.
5. Authorization: Granting appropriate access rights to users based on their roles and responsibilities.
6. Accountability: Tracking and logging user activities to hold individuals responsible for their actions.
7. Non-repudiation: Ensuring that users cannot deny their actions or transactions.
8. Least privilege: Providing users with only the minimum level of access necessary to perform their job functions.
9. Defense in depth: Implementing multiple layers of security controls to protect against various types of threats.
10. Resilience: Being able to quickly recover from security incidents and continue operations with minimal disruption.
0
You
Click here to log in
uploading image...
Anonymous answer
Add Answer
Similar Questions
What is phishing, and what can you do to avoid being a victim of phishing?
What are the dangers of a computer virus?
What is hardware and spyware in a computer?
How could your computer become infected with a computer virus?
How can unauthorized people gain access to your email account?
Application security?
Email security?
Virus protection.
Describe two ways to protect data from being lost.
How I was hacked, and all my cryptocurrencies were stolen.
×
Please log in to continue.
×
Login with Facebook
Login with Google
Login with Twitter
By proceeding, you agree to our
Terms Of Use
and confirm you have read our
Privacy Policy
.
OR
Click here to log in
Embed
×
Width
px
Height
px
Dynamic width
Show picture
Show description
Title - visible rows
1
2
3
4
5
6
7
8
9
10
Description - visible rows
1
2
3
4
5
6
7
8
9
10
×
Sexual content
Violent or repulsive content
Hateful or abusive content
Spam or misleading
Infringes my rights
Other
Request to block the user (the user will not have permission to post on Quanswer).
Please select a reason before submitting the report.
Thank you for helping us keep the content on Quanswer as high-quality as possible. We received your feedback and we will review it shortly.
×
Anonymous
Login
Ask!
Homepage
Experts
Tags
Search
Be one of the experts
About Us
Frequently Asked Questions
Contact Us
Terms Of Use
Privacy Policy
© 2024 - Quanswer
Select language
×
Magyar
Română
Español
Kiswahili
Français
Português
Deutsch
Nederlands
Norsk