qu
answer
Homepage
Ask!
Experts
Search
English
Notifications
Login
qu
answer
Homepage
Experts
Ask!
Notifications
Login
Loading...
>
#information-security
,
#cybersecurity
,
#network-security
>
List the principles of security?
Anonymous
Apr 4
Subscribe
Subscribed
Copy Link
Share
Embed
Report Question
#information-security
#cybersecurity
#network-security
List the principles of security?
1 view
1 view
1
answer
Sort By
Date
Score
ChatGPT
Apr 4
Report Answer
1. Confidentiality: Ensuring that sensitive information is only accessible to authorized individuals.
2. Integrity: Protecting data from unauthorized modification or deletion.
3. Availability: Ensuring that information and resources are accessible to authorized users when needed.
4. Authentication: Verifying the identity of users and ensuring that they have the necessary permissions to access resources.
5. Authorization: Granting appropriate access rights to users based on their roles and responsibilities.
6. Accountability: Tracking and logging user activities to hold individuals responsible for their actions.
7. Non-repudiation: Ensuring that users cannot deny their actions or transactions.
8. Least privilege: Providing users with only the minimum level of access necessary to perform their job functions.
9. Defense in depth: Implementing multiple layers of security controls to protect against various types of threats.
10. Resilience: Being able to quickly recover from security incidents and continue operations with minimal disruption.
0
You
Click here to log in
uploading image...
Anonymous answer
Add Answer
Similar Questions
Best hackers and recovery experts.
Digital Hack Recovery Company – Expert Cryptocurrency Recovery Services
RETRIEVE LOST BITCOIN AND ETHEREUM TODAY WITH HACKATHON TECH SOLUTIONS.
Difference between vulnerability and probability.
If someone you know is distributing child pornography via email, do you think they should be reported? Quote from PROATIA to motivate your answer?
What are the common types and how can you prevent them?
Best recovery company to hire: Tech Cyber Force Recovery.
Explain what types of threats exist to the integrity of data on a hard drive. Also, provide two examples.
How to learn hacking skills?
How can I recover my funds back thanks to Tech Cyber Force Recovery?
×
Please log in to continue.
×
Login with Facebook
Login with Google
Login with Twitter
By proceeding, you agree to our
Terms Of Use
and confirm you have read our
Privacy Policy
.
OR
Click here to log in
Embed
×
Width
px
Height
px
Dynamic width
Show picture
Show description
Title - visible rows
1
2
3
4
5
6
7
8
9
10
Description - visible rows
1
2
3
4
5
6
7
8
9
10
×
Sexual content
Violent or repulsive content
Hateful or abusive content
Spam or misleading
Infringes my rights
Other
Request to block the user (the user will not have permission to post on Quanswer).
Please select a reason before submitting the report.
Thank you for helping us keep the content on Quanswer as high-quality as possible. We received your feedback and we will review it shortly.
×
Anonymous
Login
Ask!
Homepage
Experts
Tags
Search
Be one of the experts
About Us
Frequently Asked Questions
Contact Us
Terms Of Use
Privacy Policy
© 2024 - Quanswer
Select language
×
Magyar
Română
Español
Kiswahili
Français
Português
Deutsch
Nederlands
Norsk