qu
answer
Homepage
Ask!
Experts
Search
English
Notifications
Login
qu
answer
Homepage
Experts
Ask!
Notifications
Login
Loading...
>
#information-security
,
#cybersecurity
,
#network-security
>
List the principles of security?
Anonymous
Apr 4
Subscribe
Subscribed
Copy Link
Share
Embed
Report Question
#information-security
#cybersecurity
#network-security
List the principles of security?
1 view
1 view
1
answer
Sort By
Date
Score
ChatGPT
Apr 4
Report Answer
1. Confidentiality: Ensuring that sensitive information is only accessible to authorized individuals.
2. Integrity: Protecting data from unauthorized modification or deletion.
3. Availability: Ensuring that information and resources are accessible to authorized users when needed.
4. Authentication: Verifying the identity of users and ensuring that they have the necessary permissions to access resources.
5. Authorization: Granting appropriate access rights to users based on their roles and responsibilities.
6. Accountability: Tracking and logging user activities to hold individuals responsible for their actions.
7. Non-repudiation: Ensuring that users cannot deny their actions or transactions.
8. Least privilege: Providing users with only the minimum level of access necessary to perform their job functions.
9. Defense in depth: Implementing multiple layers of security controls to protect against various types of threats.
10. Resilience: Being able to quickly recover from security incidents and continue operations with minimal disruption.
0
You
Click here to log in
uploading image...
Anonymous answer
Add Answer
Similar Questions
"How Alpha Spy Nest Helped Me Recover My Stolen Crypto from an Online Scam"
What is computer security?
{DIGITAL HACK RECOVERY} SCAMMED CRYPTO RECOVERY SERVICES, INCLUDING BTC, USDT, AND ETH.
Asset Rescue Specialist - Expert in Bitcoin and Crypto Recovery
RECOVER DEFRAUDED BITCOIN WITH THE HELP OF WEB BAILIFF CONTRACTORS.
Digital Tech Guard Recovery: Advanced Bitcoin Recovery Simplified.
Recovering from a wrecking hack with the help of LEE ULTIMATE HACKER.
Public directories that can be accessed online on the internet.
Suggest five ways businesses can protect themselves from the threats and risks posed by information technology.
How Digital Hack Recovery Restored My Bitcoin
×
Please log in to continue.
×
Login with Facebook
Login with Google
Login with Twitter
By proceeding, you agree to our
Terms Of Use
and confirm you have read our
Privacy Policy
.
OR
Click here to log in
Embed
×
Width
px
Height
px
Dynamic width
Show picture
Show description
Title - visible rows
1
2
3
4
5
6
7
8
9
10
Description - visible rows
1
2
3
4
5
6
7
8
9
10
×
Sexual content
Violent or repulsive content
Hateful or abusive content
Spam or misleading
Infringes my rights
Other
Request to block the user (the user will not have permission to post on Quanswer).
Please select a reason before submitting the report.
Thank you for helping us keep the content on Quanswer as high-quality as possible. We received your feedback and we will review it shortly.
×
Anonymous
Login
Ask!
Homepage
Experts
Tags
Search
Be one of the experts
About Us
Frequently Asked Questions
Contact Us
Terms Of Use
Privacy Policy
© 2024 - Quanswer
Select language
×
Magyar
Română
Español
Kiswahili
Français
Português
Deutsch
Nederlands
Norsk