question archive University of MarylandCSIA 310  There are many guidelines which, if followed, can help prevent malware security incidents

University of MarylandCSIA 310  There are many guidelines which, if followed, can help prevent malware security incidents

Subject:ManagementPrice:3.87 Bought7

University of MarylandCSIA 310 

There are many guidelines which, if followed, can help prevent malware security incidents. Which of the following are the best choices for actions that an organization can take to protect itself from malware?

Prevention, awareness, vulnerability mitigation, and threat mitigation

Where it is, authentication, prevention, and confidentiality

Authentication, authorization, non-repudiation, and integrity

Confidentiality, integrity, availability, and authorization

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Answer:

Authentication, authorization, non-repudiation, and integrity

Step-by-step explanation

Background:-  Below definitions will help you to get an idea about these terms.

 

  • Authentication:-   Authentication is the process to identify the users and check that they're legit so that unknown users can not access the system. By authentication, we're only allowing the authenticate users to enter into the system and use the resources.
  • Authorization:-   Authorization is the process of giving rights to access something to users. Rights can be for accessing a system, database, other resources, etc. and by providing this the administrator is aware of users and their rights.
  • Non-repudiation:- Assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the information. so it is basically avoiding the sender from denying the message that he has sent earlier. 
  • Integrity:- Integrity means the message or info. that has been sent should be intact and received as it is it was sent. The integrity of the message proves that there is no such malpractice that happened in between the communication message that affects the message.

 

Justification:-  By providing the above functionalities we are ensuring that no user is entering in the system which has no rights to enter(authentication), also who is entering in the system can only access those resources of which he/she has permission(authorization) and in communication, the sender can't deny what he has sent (non-repudiation) also the message in communication is intact and not affected(integrity). Thus, ensuring end-to-end communication + System protection with authorized users.

 

Thus, this practice will avoid malware security incidents.