Answer Posted / sheetal suthar
confidiantiality
authenticity
intigrity
availibility
| Is This Answer Correct ? | 1 Yes | 1 No |
Post New Answer View All Answers
What is IPCONFIG command? Why it is used?
congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....
Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?
What a security mean in your sense?
What is slowloris?
Is vpn traffic encrypted?
What is the idea behind the Bell-La Padula model?
What is cybersecurity?
How do we do authentication with message digest(md5)?
How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?
Define the meaning of an Authentication.
What is intrusion prevention systems (ips)?
What is the difference between arp & rarp?
What does cia stand for in security management?
What is Imaging/ghosting?