Lab 2 iss
-
Upload
mohd-ikhwan-j -
Category
Documents
-
view
33 -
download
4
description
Transcript of Lab 2 iss
Lab 2 Confidentiality, Available & Integrity
Lab 2 Confidentiality, Available & IntegrityIntroduction
ObjectifHardware&softwareProcedure2.1
Check name
EXERCISE1. What is the best way to secure files and folders thats you share on NTFS partitions?2. What is the definition of data confidentiality?
Conclusion
2.2
Check name
User2
Delete user 2
Exercise3. What is the best way to define the data availability?4. Give ONE(1) example of unavailability of data in network environment.
Conclusion
2.3
Exercise5. What is the definition of data integrity?Theaccuracyandconsistencyof storeddata, indicated by an absence of anyalterationin data between two updates of adata record. Data integrity is imposed within adatabaseat itsdesignstagethrough the use ofstandardrulesandprocedures, and ismaintainedthrough the use oferrorchecking andvalidationroutines.
List two threats can be used to damage the data integrity.Accidental CorruptionTheft of privileged access (access to root and admin accounts)
6. Data integrity can also be threatened by environmental hazard such as dust, surges and excessive heat. True or false?True
Page 1