answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: What term refers to a secure systems ability to protect against the unauthorized modification or destruction of information on a computer?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

3 Discuss techniques to prevent unauthorized computer access and use?

Below is additional information about helping to secure your computer and prevent any unauthorized access from other people or software programs; helping keep your information safe.


What was the impact of the Computer Misuse Act of 1990?

The computer Misuse Act of 1990 made provision for securing computer material against unauthorized access or modification. Its impact to people is to refrain from any unauthorized use of computer data.


Computer misuse acts?

The Computer Misuse Act was voted into law in the United Kingdom, partially based on the outcome of a 1987 case, R V Gold and Schifreen. Stephen Gold and Robert Schifreen were able to gain access British Telecom through its Prestel service by using regular home computers. They had obtained the password by shoulder Surfing at a trade show. Once they gained access to Prestel, they managed to gain access to the personal messages of Prince Philip. The Computer Misuse Act introduced three new criminal codes. They are unauthorized access to a computer, unauthorized access to a computer with the intent of engaging in further offenses, and unauthorized modification of computer information.


when A classified data spill, or Negligent Discharge of Classified Information (NDCI),?

Is the accidental or intentional unauthorized disclosure of classified information across computer systems


What is the difference between unauthorized access and unauthorized use?

Unauthorized access is the use of a computer or network without permission. Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities.


What is the best security for sale for computers?

Having a computer security system is very important to protect one's computer from unauthorized access, change or destruction. The best security system is to change one's passwords on a regular basis.


Disadvantages of unauthorized use of computer computer system and computer network?

stolen personal information. Damage to the computer system and/or network. Always protect your computer and network. theres more disadvantages...but use your head and think..


Why does PC security interfere with downloading from the Internet?

Computer security is information security as applied to computers and networks.The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. This included not only protection from unauthorized activities or untrustworthy individuals, but also from unplanned events and natural disasters. Bell-LaPadula model is one of the Computer security policy. The strategy is based on a coupling of special microprocessor hardware features, often involving the memory management unit, to a special correctly implemented operating system kernel.


What is is the category of damage to or modifications of computer data or programs?

Information security has two positive ideals for this area: Integrity and Availability. For data these ideas relate to the right quality of data at the right time requested. An opposite of data Integrity is unwanted data alteration. An opposite of data availability is unwanted data destruction. Unwanted data alteration damages the useful quality of the information. Unwanted data destruction prevents timely access to use of the information. The methods of achieving unwanted data modification or damage may vary.


What are the drawback of networking computer?

It makes the computer vulnerable to unauthorized access through the network.


What laws outlaws unauthorized access to a system to acquire national defense information damage protected computers or perpetrate fraud?

Computer Fraud & Abuse Act


May be used to store classified information must not run unauthorized software. Must be locked when left unattended even in an open storage environment?

Computer