Cyber attacks are incidents of system and network vulnerability exploitations to steal information, attacker need for mischievous purposes. The network security policies are mechanisms adopted to mitigate cyber attacks.
Network security policies implements user account Authorization, authentication and accounting to facilitate the confidentiality of information in the network, integrity and availability of information.
Confidentiality prevents unauthorized users from accessing a user account, in other to protect the personal information in the network.
Explanation: Confidentiality with regards to security simply means securing information belonging to certain individuals, group, entity or issues and information of national security or high level clearance by avoiding leakage to authorized persons or groups.
With regards to network structure, confidentiality encompasses safe keeping of network data structure, packet header, network protocols and other information relevant to network structure by preventing illegal or unauthorized access to such information through the use of firewalls and top level security systems.
Depends on the configuration of the email because there are two protocols POP and IMAP, the most recent protocol is IMAP, we can delete an email and this It moves to a To be Deleted folder, this happens because the email is stored in the server, but with the protocol POP the email is stored in the server and downloaded to the application, if you delete an email, this is deleted in all devices.