1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinvika [58]
3 years ago
10

In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyon

e who is not authorized to access it.
Computers and Technology
1 answer:
Neko [114]3 years ago
8 0

Answer:

Confidentiality

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cybersecurity, there are certain security standards, frameworks, antivirus utility, and best practices that must be adopted to ensure there's a formidable wall to prevent data corruption by malwares or viruses, protect data and any unauthorized access or usage of the system network.

In the context of computer and network security, confidentiality simply means that a computer system used for performing certain functions such as exchange of data must not allow the disclosing of information to and by anyone who is not authorized to access it.

Confidentiality refers to the act of sharing an information that is expected to be kept secret, especially between the parties involved. Thus, a confidential information is a secret information that mustn't be shared with the general public.

In conclusion, confidentiality requires that access to collected data be limited only to authorized staffs or persons.

You might be interested in
Which statement accurately describes DTP programs?
s2008m [1.1K]

Answer:

O DTP programs are basically layout programs.

Explanation:

Desktop publishers are vector-based graphics software, and a perfect example of one such software is Microsoft Publisher. You can consider Adobe Illustrator, and Corel Draw as well, but they are huge software meant for many more things, and hence let's include only Microsoft publisher. And a long list follows as well. And they are in general a layout program used to prepare cards, advertisements, infographics, etc, and in fact the layout for them. And hence its more appropriate to say that it is basically a layout program that uses vector graphics to accomplish its goal. Various formats supported are like SVG, EPS, PDF,AI etc. And these are vector graphics based formats. The other type is Raster, and that includes Photoshop etc, with formats iike jpeg, gif etc, and which are pixel based.

7 0
4 years ago
How would you describe enterprise computing
umka21 [38]

Answer:

It depends on the project that you are doing. If the project is on a computer and it takes effort yes it would be enterprise.

Sorry if I made no sense hopefully I helped you have a great day! :]

6 0
3 years ago
Why are computer simulations useful in studying phenomena in the universe?
amid [387]

Answer:

Explanation:

Computer simulations are helpful because they can handle the computation of a big number of variables, at the same time. The universe is a constantly changing place with many different variables changing other variables. Thus, a computer is ideal to simulate, or predict, real life phenomena because of its processing power.

7 0
2 years ago
Use the drop-down menu to identify which command is used to do the activities.
Ronch [10]

Answer:

1.  save and save as

2. save as

3. save as

4.save as

5. save and save as

Explanation:

just took did the question

6 0
3 years ago
Purpose In this lab activity, you will be introduced to the concept of enriching data with SPLUNK. This three-hour course is for
Vikki [24]

A person can enrich data in Splunk by

  • Preparing  to know data that is using Splunk to known the required fields in the data.
  • One need to think of this as if one is seeing pieces in a puzzle, then one can notice their shapes.
  • The next step is that one need to categorize data as a kind of a preamble before the act of aggregation and reporting.

<h3>What is Enriching Your Data?</h3>

Data enrichment is known to be a kind of an augmentation and it is seen as the act or the process of making better an existing information by the use of a  supplementing missing or any kind of incomplete data.

<h3> What is a Lookup?</h3>

Data Lookup is known to be the method used to make plenty any information based on rules.

Hence, A person can enrich data in Splunk by

  • Preparing  to know data that is using Splunk to known the required fields in the data.
  • One need to think of this as if one is seeing pieces in a puzzle, then one can notice their shapes.
  • The next step is that one need to categorize data as a kind of a preamble before the act of aggregation and reporting.

Learn more about SPLUNK from

brainly.com/question/26470051

#SPJ1

8 0
2 years ago
Other questions:
  • rob just got a new idea for the movie he's making, and he wants to put in late hours to get it done. Which of the following stat
    10·1 answer
  • Which of these automotive repair areas helps the vehicle change speeds to operate efficiently under all conditions?
    5·1 answer
  • What weight pencil is recommended for darkening lines and for lettering? *
    7·2 answers
  • In a car crash, wearing a seat belt __________________.
    5·2 answers
  • A network consists of 10 computers, all running windows 7 professional. one computer acts as a file server and serves up data to
    6·1 answer
  • What are the two types of formulas in excel
    9·1 answer
  • Grace is performing a penetration test against a client's network and would like to use a tool to assist in automatically execut
    13·2 answers
  • GIVING BRAINLIST TO WHOEVER ANSWERS
    9·1 answer
  • 100 POINTS!!!!!!!
    15·2 answers
  • Which of the following is not harmful to the computer?<br> a) Trojan<br> b) Rootkit<br> c)Malware
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!