which of the following security properties?

Most computer attacks result in violation of which of the following security properties?

Most computer attacks result in violation of which of the following security properties?

A.
Availability

B.
Confidentiality

C.
Integrity and control

D.
All of the choices.

Explanation:
Most computer attacks only corrupt a system’s security in very specific ways. For
example, certain attacks may enable a hacker to read specific files but don’t allow
alteration of any system components. Another attack may allow a hacker to shut down
certain system components but doesn’t allow access to any files. Despite the varied
capabilities of computer attacks, they usually result in violation of only four
different security properties: availability, confidentiality, integrity, and control.



Leave a Reply 3

Your email address will not be published. Required fields are marked *


Ahmed

Ahmed

In today’s real world problems Denial of Service attacks and stealing of information are the most prevalent. Availability and Confidentiality. We don’t hear of hackers breaking into systems to modify databases.

Barry

Barry

I differ, once hacked. Integrity and Confidentiality are questionable.

lokesh

lokesh

i agree , coz once to get in a system you violate everything