Which of the following are measures for achieving availability? (choose all that apply.)

Subject: Intro to Information Systems Security 3 Question Which of the following are measures for achieving availability? (Choose all that apply.) Fault tolerance Hashing Patching Digital signatures Redundancy


3) Availability refers to the ability to access resources or services or data in required time.
  • Fault tolerance: It is a method that ensures uninterpreted services even though some problem occurred in the system or some components are failed. Fault tolerance ensures high availability.
Thus, Fault tolerance helps to achieve high availability.
  • Redundancy: Maintaining duplicate components or resources to implement fault tolerance is called redundancy. Redundancy ensures availability in case of a resource or component is failed.
Thus, redundancy helps to achieve high availability.
  • Patching: Patching is upgrading the system or software. Patching may include fixing security vulnerabilities and adding new functionality.
  • Some of the security problems may cause system or services unavailable. Thus, patching helps to fix those security problems and helps to stay system or services available. Patching ensures availability of the system.
Thus, patching helps to achieve high availability.
  • Hashing and digital signatures: Hashing and digital signatures helps to maintain the integrity of the data.
Thus, Hashing and digital signatures may not help to achieve availability. Therefore, the measures that ensures availability are “Fault tolerance, Patching and Redundancy” 4)
  • Each cloud storage provider provide service guarantee up to some level. Thus, service guarantee is not absent completely.
  • Cloud storage environment allows the users to login with a password and also allows to set their passwords.
  • Obviously, cloud storage is cheaper.
  • In cloud storage environment, more storage can be added easily so that more users can be added to cloud storage environment. Thus, cloud storage is scalable.
  • In cloud storage environment, user’s data is stored at cloud storage provider’s owned server that may reside anywhere in the world. Thus, user may not have control over their data.
Therefore, “one may not have control over how their data is protected or safeguarded” is true. 5) Mobile devices encryption refers encrypting the data that is stored in or copied to mobile device. A mobile device encryption system or software encrypts the mobile data so that unauthorized users cannot access the user’s data. Database encryption is a process of encrypting the data stored in a database so that the data can be protected from unauthorized users. Full Disk encryption is a process of encrypting the entire data on disk using a key. Thus, even though the disk is stolen, unauthorized users cannot access the data. Whenever the system or the user creates a file, the disk encryption encrypts that file automatically. Removable media encryption is a process of encrypting data that is copied onto removable media devices like USB flash drives, external hard disks, SD cards etc. Removable media encryption software encrypts each file using a password when the user copies files onto removable device. In order to access the encrypted files user must enter the password. Individual File encryption is used to encrypt specific files. Thus, different keys are used to encrypt different files. When a file is created, user must specify whether the file is to be encrypted or not.

Therefore, all the given options are feasible to implement data encryption.

Leave a Comment