The confidentiality principle ensures that sensitive information is only accessible to authorized users. Data exfiltration violates this principle, as attackers accessed private customer information without permission. Maintaining confidentiality involves: 1. Encryption to secure data at rest and in transit. 2. Access controls to restrict unauthorized users. 3. Regular audits to identify potential vulnerabilities. Since the attackers didn’t alter the data, integrity and availability remain intact, making confidentiality the primary concern. Why Other Options Are Incorrect: • B) Integrity: Incorrect because the data wasn’t modified. • C) Availability: The system remained operational and accessible. • D) Authentication: Focuses on verifying user identity but isn’t directly violated here. • E) Non-repudiation: This principle isn’t relevant to data theft scenarios.
12, 27, 44, 68, 94
7, 15, 31, 79, 271, 1221
140 150 175 185 210 225
...48, 112, 144, 192, 310, 732
7, 78, 324, 900,1855, 3128
9, 10, 12, 18, 42, 160
99 124 160 209 273 355 454
3 4 18 72 360 2160
33 34 37 42 48 58
Direction: Find the wrong number in given number series.
958, 954, 981, 948, 1299, 1218