Confidentiality - protecting information frombeing disclosed to unauthorized parties.InfoSec: C-I-A TriadIntegrity - protecting information from beingchanged by unauthorised parties.Availability - to the availability of information toauthorized parties only when requestedA virus is a program designed to interfere with yourcomputer, device or network’s normal operation. A virusattaches itself in a program or a file and like real-life viruses,computer viruses can multiply or make complete copies ofthemselves when you copy the program or file that it isattached to.1A worm is considered as type of virus. Like a virus, it canmake copies of itself in computers that it comes in contactwith.2. WormA Trojan Horse or simply a Trojan is a type of malware thatdisguises itself as a useful and/or harmless program or file.Unwanted email mostly from bots or advertisers. It can beused to send malware.4. SpamA program designed to send you advertisements, mostly aspop-ups - take the quiz
{"name":"Confidentiality - protecting information frombeing disclosed to unauthorized parties.InfoSec: C-I-A TriadIntegrity - protecting information from beingchanged by unauthorised parties.Availability - to the availability of information toauthorized parties only when requestedA virus is a program designed to interfere with yourcomputer, device or network’s normal operation. A virusattaches itself in a program or a file and like real-life viruses,computer viruses can multiply or make complete copies ofthemselves when you copy the program or file that it isattached to.1A worm is considered as type of virus. Like a virus, it canmake copies of itself in computers that it comes in contactwith.2. WormA Trojan Horse or simply a Trojan is a type of malware thatdisguises itself as a useful and\/or harmless program or file.Unwanted email mostly from bots or advertisers. It can beused to send malware.4. SpamA program designed to send you advertisements, mostly aspop-ups - take the quiz", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What is the purpose of confidentiality in information security?, Which of the following is a type of malware that disguises itself as a legitimate program or file?, What is the primary goal of integrity in information security?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}