Introduction to Network Security Exam - Q & A
Introduction to Network Security Exam - Q & A Phishing a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail Confidentiality is to prevent an unauthorized user from accessing, copying, or transmitting the information. Integrity identify where the information came from and if the data has changed since it was originally sent. This is a function that is often incorporated into encryption and, therefore, works well with the confidentiality principle. Availability The goal is to ensure that the data is always accessible by its authorized users White hat hackers IT professionals who specialize in penetrating or compromising network security but only to help an organization improve its own security posture. Black hat hackers may or may not be IT professionals but possess the knowledge and will to breach systems for profit. That profit may be monetary, street credibility, or just a source of entertainment. Gray hat hackers a group of people who may or may not be IT professionals and may or may not choose to break laws in pursuit of their hacking goals.
Geschreven voor
- Instelling
- Introduction to Network Security
- Vak
- Introduction to Network Security
Documentinformatie
- Geüpload op
- 15 februari 2024
- Aantal pagina's
- 3
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
introduction to network security exam
-
introduction to network security