1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amid [387]
3 years ago
12

In these weeks readings, we learned about the CIA Triad and how each exhibits dependence on the other. Give examples of how fail

ure of one security property (confidentiality/integrity/availability) can lead to the failure of the others. How does a password or authentication relate to this situation?
Computers and Technology
1 answer:
nikklg [1K]3 years ago
6 0

Answer:

Confidentiality, integrity, and availability make up the CIA (or security) triad. We rely on each prong of this triangle for the purpose of keeping our resources secure and unaltered.

Explanation:

Confidentiality, integrity, and availability make up the CIA (or security) triad. We rely on each prong of this triangle for the purpose of keeping our resources secure and unaltered. For example, if a person intercepts data we are sending, then confidentiality has been breached and data is no longer secure. In the same light, if a person changes data stored in files than that integrity has been compromised. Finally, if there is a disruption, due to nature or human error/malice, availability is lost. Loss of one security directly effects the other factors of the triad.

Let’s take the loss of availability into consideration. A major hurricane hits the east coast. This hurricane causes a massive power outage. For the reason being that major hurricanes do not occur on the east coast, security teams did not account for this sort of natural disaster. As a result, many people are unable to access files or applications on their computer; servers are down all over the east and people are now not able to log into bank accounts, stock portfolios, etc. This is a major loss of information.

Password are kept secret because they need not to be shared. Password is used to shield information. The CIA triad requires that organizations and individual users must always take caution in maintaining confidentiality, integrity and availability of information and password is a means.

You might be interested in
Which of the following is the best way to locate books and research from all over the United States and abroad?
Usimov [2.4K]

WorldCat is the world’s largest library catalog. If you are looking to find books and research from all over the world, WorldCat would be the perfect website to use.

3 0
4 years ago
Read 2 more answers
In the lab, you used the filter box in Wireshark to remove traffic from port 3389. What is that port used for? What filter synta
Dmitry_Shevchenko [17]

Answer:

Port 3389 is used for remote desktop access to graphical interfaces.

The syntax used to track ping traffic is " tcp.port eq 25 or icmp".

Explanation:

Wireshark is a network packet sniffer tool used to analysing and troubleshooting packet transmission in a network.

The ping command is used in a network to check or confirm connectivity between two devices in the network. It sends ICMP message echos to the specified IP address and receives it back if there is connection. To get the ping traffic in wireshark the command syntax " tcp.port eq 25 or icmp" is used.

The port 3389 is a TCP and UDP listening port for the Microsoft proprietary protocol called remote desktop protocol or connection used to remotely connect to the graphical interface of other system running the RDP server.

6 0
3 years ago
Watch any film of the silent era. Choose a short film from any genre that is less than 30 minutes long. Write a review of your e
Nutka1998 [239]

 A review of your experience of watching this film. Make comparisons with a modern film of the same genre that you have recently watched The Consistency of the Silent Era Technique in The Artist.

<h3>What have been a number of the principal silent movie genres?</h3>

Many early silent movies have been both dramas, epics, romances, or comedies (frequently slapstick). One-reelers (10-12 minutes) quickly gave manner to four-reel feature-period movies.

From the factor of visible method seems there are a few which can be ordinary of the silent film technology this is appearing players, kind of shot, modifying transitions, intertitles and sound strategies together with using track at some stage in the movie.

Read more about the comparisons :

brainly.com/question/25261401

#SPJ1

7 0
2 years ago
How to can you avoid becoming a victim of identity theft?
dusya [7]

Reduce the number of credit and debit cards you carry in your wallet. <em>I</em> recommend that you do not use debit cards because of the potential for losses to your checking account. Instead, carry one or two credit cards and your ATM card in your wallet. Nonetheless, debit cards are popular. If you do use them, take advantage of online access to your bank account to monitor account activity frequently. Report evidence of fraud to your financial institution immediately.

5 0
4 years ago
When creating an html document, what do we use to set aside space for content?.
LUCKY_DIMON [66]

AnswerTags:

Explanation:

3 0
2 years ago
Other questions:
  • Gaetan has attempted to enter the passcode for his mobile device but keeps entering the wrong code. Now he is asked to enter a s
    12·1 answer
  • Select the correct answer. Rachel needs to make a presentation on ethics and etiquettes in college. She has about 30 minutes to
    13·1 answer
  • What is the purpose of ergonomics in the workplace? A.Keep workers safe and injury free
    5·2 answers
  • How do you activate caps lock on chromebook
    10·2 answers
  • Modify your solution to Problem 8.24 so that one (and only one) child installs a Segmentation-fault handler which prints an erro
    10·1 answer
  • What helps companies and organizations to target masses of people, provide 24/7 services, and deliver better marketing in a chea
    6·1 answer
  • Colin Mackay Inc., a software company with its head office in Amsterdam, has employees across three continents. Certain project
    11·1 answer
  • Who still plays old Nintendo 64 games?
    6·2 answers
  • List an example of application software used in spreadsheet​
    11·2 answers
  • Why should you list more than one font if you are formatting some text using CSS?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!