answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: Can a system provide integrity without confidentiality?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Principles essential to a secure information systems?

All of the following are principles essential to a secure information system except:


Is it moral integrity or legal integrity that allows ignorance of the perpetrators in a republican style legal system where curing crime is not a rule at law without oversight protection?

It is legal integrity.


What level of system and network configuration is required for CUI?

Moderate confidentiality


What is security control?

Objectives of information Security and control= 1. To prevent unauthorized access to the location. 2. to prevent confidentiality of data. 3. To provide disaster recovery system. 4. prevention of malicious damage. 5. prevention of prevention from accidental damage. Characteristics of IS&c= 1.Integrity=A system functions as intended then it is considered to have integrity. So the system designers make such a system that can work even if one or more components do not work. 2.Auditability=Easy to examine,verify,and demonstrate the performance of a system. 3.Controlability=helps management to have control over use and content of a system.


What is Data security controls?

Objectives of information Security and control= 1. To prevent unauthorized access to the location. 2. to prevent confidentiality of data. 3. To provide disaster recovery system. 4. prevention of malicious damage. 5. prevention of prevention from accidental damage. Characteristics of IS&c= 1.Integrity=A system functions as intended then it is considered to have integrity. So the system designers make such a system that can work even if one or more components do not work. 2.Auditability=Easy to examine,verify,and demonstrate the performance of a system. 3.Controlability=helps management to have control over use and content of a system.


Are Cybersecurity methods ethical?

The goal of cybersecurity is to protect the confidentiality, integrity, and availability of information systems and the data contained within. To ask whether cybersecurity is ethical is similar to asking whether a security system is ethical, and the answer is, "of course".


How the speakerphone function of the front desk telephone system can be used without violating patient confidentiality?

Speakerphone can only be used if there is nobody else in the room except for the doctor or patient. Otherwise the risk of violating patient confidentiality is at risk.


Which key is used to encrypt data in an asymmetric encryption system?

This answer depends on who is sending the information in a secure manner. If confidentiality is required, then the public key of the receiver is used to encrypt the message. If integrity is desired then your private key would be used to encrypt the message.


If your coworker is able to access your 401K accounts to check your balance which secure system property is being violated?

confidentiality


How data loses its integrity?

In database system one of the main feature is that it maintains data integrity. When integrity constraints are not enforces then the data loses its integrity.


What is system integrity management?

An operating system is said to have system integrity when it is designed, implemented and maintained to protect itself against unauthorized access, and does so to the extent that security controls specified for that system cannot be compromised. A multilevel-secure trusted computing base ensures system integrity.


What are the required levels of integrity and availability for a MAC I system?

A high level of integrity and a high level of availability