preview

Nt1310 Unit 3

Decent Essays

Q1. Describe the concept of data confidentially.
Data confidentiality is one of the three main IT security components which are data confidentiality, integrity, and availability (CIA). To keep your data confidential means to protect your data from unauthorized access. In other words, sensitive data are stored in a protected system that keep these information and data away from attackers and here the data confidentiality will measure the ability of the system to protect its data.
a. What is the negative result of the loss of data confidentially? the loss of data confidentiality is a huge risk and affect negatively to any business. The common term used for that is data breach. The most important factors at any business even small business are …show more content…

Another example from our personal life which is bank transactions.
Q2. Viruses are a constant threat. Describe briefly how virus protection software works, and why it can never be 100% effective.
As we know virus protection software is a code written by one of the programing languages that we know. This code works as a search engine looking for infected files in the entire system or specific locations on the system. The idea depends on two important factors which are, search engine and viruses’ data base. The following scenario explains how people get viruses and how virus protection software works.
Let’s say user (A) download an execution file (EXE) on his-her PC and double click on that file, if this file is infected the virus works based on the written code by the hacker/ attacker/ intruder and copy some files into the system. In case, user (A) does not have virus protection, the virus works perfect in destroying that computer or sending information from this computer to the attacker email. Viruses not only designed to destroy PC’s, but also designed to get information from …show more content…

Authentication factors could be classified into four factors which are, factors that users never forget, factors that people use to get access, factors that people have on their body, and the location. To explain more, multifactor authentication is recommended because of the security incidents these days. The worst factor that I used in my life is password because it does provide less security and anyone could guess passwords. Right now, I am using passphrases even in my social media accounts. Another example is the PIN number at the ATM machine, it provides security but sometimes not active because of the scammers. Mobile applications help a lot in our life and some application have security roles that ensures the security and privacy. Biometric is another important method in protection using fingerprint is the most common way. Finally, getting the location of the user is an important method for security, a good example is location services in the phone or

Get Access