ExamGecko
Question list
Search
Search

Question 51 - ICS-SCADA Cyber Security discussion

Report
Export

Which component of the IT Security Model is attacked with eavesdropping and interception?

A.
Confidentiality
Answers
A.
Confidentiality
B.
Availability
Answers
B.
Availability
C.
Integrity
Answers
C.
Integrity
D.
Authentication
Answers
D.
Authentication
Suggested answer: A

Explanation:

Eavesdropping and interception primarily attack the confidentiality component of the IT Security Model. Confidentiality is concerned with protecting information from being accessed by unauthorized parties. Eavesdropping involves listening to private communication or capturing data as it is transmitted over a network, thereby breaching the confidentiality of the information.

Reference:

William Stallings, 'Cryptography and Network Security: Principles and Practice'.

asked 18/09/2024
samir Heniche
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first