- Information
- AI Chat
Was this document helpful?
Paper-solution-cs - question solutions
Course: Cyber Security Honors
12 Documents
Students shared 12 documents in this course
University: Savitribai Phule Pune University
Was this document helpful?
B.E (Computer)
Paper Solution of CYBER SECURITY (26 th
Feb 2016)
(Semester-II) (Elective-III)
Q1) a) List and explain various element of information Security. [4]
Confidentiality is the process of preventing disclosure of information to unauthorized
individuals or systems.
Examples: Credit card
Confidentiality is necessary, but not sufficient to maintain privacy
Interception Causes Loss of Message Confidentiality.
Integrity means that data cannot be modified/change without Authorization
Examples: Manual deletion or alteration or creation of important data files, Virus infection,
Employee altering their own salary, website vandalism, polling fraud.
Modification Causes Loss of Message integrity
Availability For any information/system to serve its purpose,
The information must be accessible & usable when it is needed.
Computing systems used to store and process the information, the security controls
used to protect it, and the communication channels used to access it must be
functioning correctly.
Examples: Power outages, Hardware failures, System upgrades and Preventing DOS attacks
Authenticity In computing, e-Business and information security it is necessary to ensure that
the data , transactions, communications or documents (electronic or physical) are genuine (i.e.
they have not been forged or fabricated.)
Examples: Passport, Credit card Accounts, academic transcripts
Fabrication is possible in absence of proper authentication
Non-Repudiation It is a complex term used to describe the lack of deniability of ownership of a
message, piece of data, or Transaction.
Examples: Proof of an ATM transaction, a stock trade, or an email
It does not allow the sender of a message to refute the claim of not sending that message