After a data breach, a company is able to trace the source of the leak back to a specific employee. This demonstrates the principle of ____________.
- Accountability
- Anonymity
- Integrity
- Non-repudiation
The ability to trace a data breach back to a specific employee demonstrates the principle of Accountability. Accountability ensures that individuals are responsible for their actions, making it possible to identify and address security incidents effectively. This principle plays a vital role in maintaining a secure environment and holding individuals accountable for their actions in the context of information security.__________________________________________________
Loading...
Related Quiz
- In advanced SIEM, ____________ helps in predicting potential security threats based on historical data.
- A 5G network operator detects an anomaly in traffic patterns, which turns out to be a cyber-attack targeting IoT devices. This scenario illustrates the importance of ____________ in 5G networks.
- ____________ is a firewall configuration approach that denies all traffic unless explicitly allowed.
- In Threat Intelligence, what does IoC (Indicator of Compromise) typically represent?
- The process of recovering deleted, encrypted, or damaged file information is known as ____________.