1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amid [387]
3 years ago
12

In these weeks readings, we learned about the CIA Triad and how each exhibits dependence on the other. Give examples of how fail

ure of one security property (confidentiality/integrity/availability) can lead to the failure of the others. How does a password or authentication relate to this situation?
Computers and Technology
1 answer:
nikklg [1K]3 years ago
6 0

Answer:

Confidentiality, integrity, and availability make up the CIA (or security) triad. We rely on each prong of this triangle for the purpose of keeping our resources secure and unaltered.

Explanation:

Confidentiality, integrity, and availability make up the CIA (or security) triad. We rely on each prong of this triangle for the purpose of keeping our resources secure and unaltered. For example, if a person intercepts data we are sending, then confidentiality has been breached and data is no longer secure. In the same light, if a person changes data stored in files than that integrity has been compromised. Finally, if there is a disruption, due to nature or human error/malice, availability is lost. Loss of one security directly effects the other factors of the triad.

Let’s take the loss of availability into consideration. A major hurricane hits the east coast. This hurricane causes a massive power outage. For the reason being that major hurricanes do not occur on the east coast, security teams did not account for this sort of natural disaster. As a result, many people are unable to access files or applications on their computer; servers are down all over the east and people are now not able to log into bank accounts, stock portfolios, etc. This is a major loss of information.

Password are kept secret because they need not to be shared. Password is used to shield information. The CIA triad requires that organizations and individual users must always take caution in maintaining confidentiality, integrity and availability of information and password is a means.

You might be interested in
What can be designed to create annoying glitches or destroy data
Yanka [14]
Viruses can cause this.
3 0
3 years ago
I will mark you as brainlist
weeeeeb [17]

Answer:

download it

Explanation:

because if u upload it will not save .

7 0
3 years ago
Read 2 more answers
How to see if your computer has bluetooth?
RUDIKE [14]
Assuming you're running Windows, click the start button, and then search for "Device Manager" (or open CMD or PowerShell and type devmgmt.msc). Look at the list of devices. If Bluetooth is there, you have it; if it's not there, you don't. 
3 0
3 years ago
The darker shadow of an eclipse is called the penumbra.<br><br> True<br><br> False
Kryger [21]
The correct answer for your  question is true, Hope this helps
8 0
3 years ago
Linda is training to become a certified network design expert and consultant. While researching about the process of cellular ra
mel-nik [20]

Answer:

a. The cell tower forwards the call to the wireless provider's Mobile Telephone Switching Office

Explanation:

When a cell phone user begins to make a call, it is picked up by the cell tower located in the cell in which the cell phone is located and that belongs to the user's wireless provider. The next step in this process is that the cell tower forwards the call to the wireless provider's Mobile Telephone Switching Office.

8 0
3 years ago
Other questions:
  • Write a C program that has the following statements: int a, b; a = 10; b = a + fun(); printf("With the function call on the righ
    12·1 answer
  • What is the main characteristic of a Peer-to-Peer (P2P) network?
    8·1 answer
  • The problem with the media giving equal air time to those who are __________ about the effects of media violence on violent beha
    9·1 answer
  • You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software p
    15·1 answer
  • Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as we
    8·1 answer
  • [1] Please find all the candidate keys and the primary key (or composite primary key) Candidate Key: _______________________ Pri
    6·1 answer
  • Shelby wants to move “ExpirationDate” to the top of the datasheet. What should she do?
    13·1 answer
  • In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be co
    13·1 answer
  • Write a short-essay discussing your own stand on social media usage for students.​
    5·1 answer
  • How can structure of a table change in sql. What general types of changes are possible
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!