Confidentiality - protecting information frombeing disclosed to unauthorized parties.InfoSec: C-I-A TriadIntegrity - protecting information from beingchanged by unauthorised parties.Availability - to the availability of information toauthorized parties only when requestedA virus is a program designed to interfere with yourcomputer, device or network’s normal operation. A virusattaches itself in a program or a file and like real-life viruses,computer viruses can multiply or make complete copies ofthemselves when you copy the program or file that it isattached to.1A worm is considered as type of virus. Like a virus, it canmake copies of itself in computers that it comes in contactwith.2. WormA Trojan Horse or simply a Trojan is a type of malware thatdisguises itself as a useful and/or harmless program or file.Unwanted email mostly from bots or advertisers. It can beused to send malware.4. SpamA program designed to send you advertisements, mostly aspop-ups - take the quiz
{"name":"Confidentiality - protecting information frombeing disclosed to unauthorized parties.InfoSec: C-I-A TriadIntegrity - protecting information from beingchanged by unauthorised parties.Availability - to the availability of information toauthorized parties only when requestedA virus is a program designed to interfere with yourcomputer, device or network’s normal operation. A virusattaches itself in a program or a file and like real-life viruses,computer viruses can multiply or make complete copies ofthemselves when you copy the program or file that it isattached to.1A worm is considered as type of virus. Like a virus, it canmake copies of itself in computers that it comes in contactwith.2. WormA Trojan Horse or simply a Trojan is a type of malware thatdisguises itself as a useful and\/or harmless program or file.Unwanted email mostly from bots or advertisers. It can beused to send malware.4. SpamA program designed to send you advertisements, mostly aspop-ups - take the quiz", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What is the purpose of confidentiality in information security?, Which of the following is a type of malware that disguises itself as a legitimate program or file?, What is the primary goal of integrity in information security?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
More Quizzes
FPD 101
1266
How Well Do You Know Hannah Parker?
24120
How well do you know me?
10525
MATHS
210
PT.110 Ch.10
13615
Capturing Demographic and Biometric Details
2010103
ONEMTAL Istanbul Mind Your Diet Quiz II For training
20100
Around the world in 80 days
520
Anika horen teil 1
520
TEPA LEGENDARY AWARDS 2017
320
Find Your Video Personality!
1166
Nervous System
1360