Segundo o texto, quando os dados não são tratados de forma a...
O texto a seguir deve ser utilizado para responder às questões de números 21 a 23.
Historically, information security has been called a number of different things such as:
• Data security;
• IT Security;
• Computer security.
But these terms (except possibly data security) ignore the fact that the information that is held on the computers is almost always and most certainly worth many times more than the computers that it runs on. The correct term is ‘information security’ and typically information security comprises three component parts:
• Confidentiality. Assurance that information is shared only among authorised persons or organisations. Breaches of confidentiality can occur when data is not handled in a manner appropriate to safeguard the confidentiality of the information concerned. Such disclosure can take place by word of mouth, by printing, copying, e-mailing or creating documents and other data etc.;
• Integrity. Assurance that the information is authentic and complete. Ensuring that information can be relied upon to be sufficiently accurate for its purpose. The term ‘integrity’ is used frequently when considering information security as it represents one of the primary indicators of information security (or lack of it). The integrity of data is not only whether the data is ‘correct’, but whether it can be trusted and relied upon;
• Availability. Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them.
(Extraído de: “An Introduction to Information, Network and Internet Security.
What is ‘Information Security’?” The Security Practitioner
http://security.practitioner.com/introduction/infosec_2.htm)
Segundo o texto, quando os dados não são tratados de forma adequada para salvaguardar a confidencialidade da informação de interesse, pode ocorrer