Lab 2 iss

11
Lab 2 –Confidentiality, Available & Integrity Introduction Objectif Hardware&software Procedure 2.1 Page 1

description

asdfgh

Transcript of Lab 2 iss

Lab 2 Confidentiality, Available & Integrity

Lab 2 Confidentiality, Available & IntegrityIntroduction

ObjectifHardware&softwareProcedure2.1

Check name

EXERCISE1. What is the best way to secure files and folders thats you share on NTFS partitions?2. What is the definition of data confidentiality?

Conclusion

2.2

Check name

User2

Delete user 2

Exercise3. What is the best way to define the data availability?4. Give ONE(1) example of unavailability of data in network environment.

Conclusion

2.3

Exercise5. What is the definition of data integrity?Theaccuracyandconsistencyof storeddata, indicated by an absence of anyalterationin data between two updates of adata record. Data integrity is imposed within adatabaseat itsdesignstagethrough the use ofstandardrulesandprocedures, and ismaintainedthrough the use oferrorchecking andvalidationroutines.

List two threats can be used to damage the data integrity.Accidental CorruptionTheft of privileged access (access to root and admin accounts)

6. Data integrity can also be threatened by environmental hazard such as dust, surges and excessive heat. True or false?True

Page 1