Using 4 suitable examples , briefly discuss the conflicts of privacy and security ideals
Using 4 examples , explain the following components of the triad for a database that stores records of students' marks
a. Confidentiality
.b integrity
.c Availability
Using 4 examples, differentiate between detective and administrative policies as part of organiional cyber security steps
Use 4 examples for each the following concepts in the context of cyber security
Anonymisation of shared information
Pretection of shared information
Information classification
Trust
CiSP
Fakir Mohamad is the owner and manager of Coach’s convenience store. As with most such establishments, it is located on the intersection of two streets and sells gasoline in addition to the myriad of goods inside. Fakir has connected the two point-of-sales registers in the convenience store as a network and has DSL access from home. His home computer uses the same DSL access for his personal email but he does not yet use email at work. He has Internet access at home but not at work as he has blocked all IP addresses except his home machine. Therefore, he is subject to virtual threats by way of his home environment to the work system.
What preventive, defensive, and protective measures should Fakir take at the store? DISCUSS it and support your answer with relevant data and information.
Discuss TWO (2) of the best encryptions that are available today for social media platform users based on your observation. Support your answer with relevant data and information.
As a computer user, how would you strengthen user authentication?
As a computer user, what should you do once you identify that your computer device has been compromised?
As a computer user, what sorts of anomalies would you look for to identify a compromised system?
DESCRIBE TWO (2) features of Among Us that can inspire to improve our lives in computer security management scope. Support your answer with relevant data and information.