answersLogoWhite

0

Security normally refers to Confidentiality, Integrity and Availability.

Briefly, your files must be:

  • accessible: only to the persons and applications you authorize, and with the minimum privilege required (if a user has only the need to read a file, he/she MUST NOT have the right to modify or delete it);
  • modifiable: only by users or applications authorized to do so;
  • available: when the authorized users need to access them: a file is useless if it not available when you need it.

Additionally, there are a couple of additional related aspects that are:

  • authenticity: the files must be attributable without doubts to the creator;
  • non-repudiation: the creator of the file must not be able to disavow the files he/she has created.
User Avatar

Wiki User

14y ago

What else can I help you with?

Continue Learning about Computer Science

Access denied encrypted files?

Encrypted files can only be accessed by authorized computer users who have the decryption key. Encryption is a popular technique in Information Security.


What is digital security most used for?

Digital Security involves protecting your internet account and files from outside intrusions and virus attacks. It involves securing browsers, home networks and all the devices that are located on that network.


How do you replace Adobe Acrobat Professional with PDFill?

I think the Adobe Acrobat 8 Professional is the best PDF reader tool. Adobe Acrobat 8 Professional introduces some innovative new features. For example, the new Combine Files wizard makes it easy to arrange a set of files and merge them into a single PDF document or assemble them into a PDF package (a container for multiple documents). A PDF package preserves the security settings of the original files, such as digital signatures, and can protect its contents with additional security features.


How can you send files securely for free?

Email is generally not secure, so sending file attachments via email is a potential security risk. Several websites exist that will allow you to send your files free and securely, however. Most notable of these are SwiftFile and yousendit See links below.


What are application of information technology in medical science?

Uses of information technology in medical field include storing files, data analysis, and medical testing. Information technology is also used for communication and security.

Related Questions

What files constitute the vista and XP registry?

Five files stored in the C:\Windows\System32\config folder; these files are called hives and they are named the SAM (Security Accounts Manager), Security, Software, System, and Default hives.


What role does a phantom download technician play in ensuring the security of digital files and preventing unauthorized access?

A phantom download technician helps maintain the security of digital files by monitoring and controlling the downloading of files, ensuring that only authorized users have access to sensitive information. They prevent unauthorized access by implementing security measures and protocols to protect the integrity of the files.


Where can one find files for Windows security?

One can find information on how to find files for Windows Security online on Wikipedia. Some other helpful sites that have this information are ESecurityPlanet, and Microsoft.


Does a person who files taxes with an ITIN contribute to Social Security?

yes


Breaches of security on the net?

Breaches of security on the net means that someone who is not authorized has breached the security of a company. Someone has gained access to files or data by hacking into a system.


How can I send raw files securely and efficiently?

To send raw files securely and efficiently, you can use encrypted file transfer services or secure cloud storage platforms. These services provide encryption to protect your files during transfer and storage, ensuring their security. Additionally, you can use password protection or secure links to further enhance the security of your raw files.


What feature of windows XP Professional allows you to prevent people who gain access to a computer's files from reading the contents of the files?

Local Security Policy


What methods do you use to secure your computer files?

The best thing to do is have a firewall and some kind of security software on the computer itself. If you have files with sensitive information you may want to encrypt them. security software as in anti-virus protector ...like norton


what is the main benefit of offline backup?

The main benefit of offline backup is the security of a persons computer files. Having security backups for computer files can save someone from awful lot of trouble if the computer is lost or stolen or broken somehow.


Access denied encrypted files?

Encrypted files can only be accessed by authorized computer users who have the decryption key. Encryption is a popular technique in Information Security.


Does free online file storage have any security issues you should know about?

Yes, you will always want to protect your files from hackers. If you are utilizing a LAN, you may have security issues if your files are shared or on a shared drive. If this is the case, you can password protect your documents.


How do you store log files into event viewer?

application log, security log, system log