1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amid [387]
3 years ago
12

In these weeks readings, we learned about the CIA Triad and how each exhibits dependence on the other. Give examples of how fail

ure of one security property (confidentiality/integrity/availability) can lead to the failure of the others. How does a password or authentication relate to this situation?
Computers and Technology
1 answer:
nikklg [1K]3 years ago
6 0

Answer:

Confidentiality, integrity, and availability make up the CIA (or security) triad. We rely on each prong of this triangle for the purpose of keeping our resources secure and unaltered.

Explanation:

Confidentiality, integrity, and availability make up the CIA (or security) triad. We rely on each prong of this triangle for the purpose of keeping our resources secure and unaltered. For example, if a person intercepts data we are sending, then confidentiality has been breached and data is no longer secure. In the same light, if a person changes data stored in files than that integrity has been compromised. Finally, if there is a disruption, due to nature or human error/malice, availability is lost. Loss of one security directly effects the other factors of the triad.

Let’s take the loss of availability into consideration. A major hurricane hits the east coast. This hurricane causes a massive power outage. For the reason being that major hurricanes do not occur on the east coast, security teams did not account for this sort of natural disaster. As a result, many people are unable to access files or applications on their computer; servers are down all over the east and people are now not able to log into bank accounts, stock portfolios, etc. This is a major loss of information.

Password are kept secret because they need not to be shared. Password is used to shield information. The CIA triad requires that organizations and individual users must always take caution in maintaining confidentiality, integrity and availability of information and password is a means.

You might be interested in
Value appears on the left hand side of cell <br> true or false
11111nata11111 [884]

Answer:

True

Your welcome

.........

4 0
3 years ago
Read 2 more answers
A leading pharmaceutical company is launching a major transformation of its entire Cloud operations in order to more quickly and
klasskru [66]

This is a great move for the Pharmaceutical company for a number of reasons.

  • The first and perhaps most important advantage is to the company is that costs relating to Information and Technology (IT) Infrastructure will be reduced to the barest minimum. As a start-up, it is important to keep costs as low as possible. Costs are kept low because the organization will not need to pay the added energy and personnel-related costs of maintaining an elaborate IT infrastructure.

  • The advantage of scalability. Scalability in this sense simply means the ability to take on additional workload or adjust to market demand. As the company grows and attracts more clients, it would need to expand beyond the capacity that it had at the onset. Opting for Cloud as a Service (CaaS) gives them this advantage.

  • Another way CaaS can help the client is that they enjoy the advantage of Business Continuity. Business Continuity is the ability to remain in business regardless of disruptions to the business itself at one location. This is because CaaS providers are structured in such a way that they are able to keep their subscribers in operation regardless of any disasters.

Other advantages to this client are:

  1. Ease and access of automatic updates to the system;
  2. Ease of collaboration between internal and external users of the same system.

Learn more about the merits of Cloud as a Service here:

brainly.com/question/24705780

4 0
2 years ago
Which feature of spreadsheet software can display numerical data in a visually appealing and easily understood format
Bad White [126]
A table maker makes visually appealing tables such as line graphs, bar graphs, venn diagrams on a spreadsheet software. 
8 0
3 years ago
Read 2 more answers
You are testing a site and realize that when you click a graphic link you see an outline but no picture. What is wrong with the
deff fn [24]

Pictures not loading on websites Chrome – Many users reported that pictures aren't loading on websites in Chrome. To fix the problem, be sure to check your Chrome settings and disable your antivirus. Images won't load in Chrome – Sometimes this issue can appear if JavaScript is disabled in your browser.

Explanation:

Speaking of image problems, users reported the following issues:

  • Broken image icon Firefox, Internet Explorer – According to users, you might be able to experience this issue in other browsers including Firefox and Internet Explorer. If the problem appears in other browsers, the issue is related to your system or to your network configuration.
  • Pictures not loading on websites Chrome – Many users reported that pictures aren’t loading on websites in Chrome. To fix the problem, be sure to check your Chrome settings and disable your antivirus.
  • Images won’t load in Chrome – Sometimes this issue can appear if JavaScript is disabled in your browser. If that’s the case, simply enable JavaScript and the problem will be resolved.
  • Chrome showing broken images – In some cases, extensions can lead to this problem, and if you noticed that your images are missing, simply disable or uninstall your extensions and check if that solves the problem.
  • You can remove an image from the preview by clicking the thumbnail below Available images. Edit Descriptions: If you've added multiple images, click the description below each image in the preview to edit it.
  • Icon in the top-right corner of the window. Select Internet Options. In the Internet Options window, click the Advanced tab. In the Settings under Multimedia, make sure there is a check in the Show Pictures check box.
7 0
3 years ago
If a printer is not Wi-Fi capable, how can it be set up to provide the most reliable wireless printing
SCORPION-xisa [38]

Answer:

Well you can use bluetooth since it doesn’t require wifi and it would still work if your printing a file from your computer or your flash drive.

5 0
3 years ago
Read 2 more answers
Other questions:
  • What is computing networking​
    5·1 answer
  • Why is it important to use proper line types
    13·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    9·1 answer
  • What activities are the most likely to infect your computer vith a virus? Check all that apply.
    10·1 answer
  • A business would use a website analytics tool for all of the following EXCEPT _____.
    9·1 answer
  • Cn someone help me plz
    11·1 answer
  • All changes
    15·1 answer
  • Which of the following situations is least likely fair use
    6·2 answers
  • 1.erros can easily be ____ 2.work is done in an ____ no mess environment 3.colors do not _____ and brushes are never ______ 4.st
    14·1 answer
  • The terminology used to describe a possible path to resolution to a problem from one end to the other is called what?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!