1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amid [387]
3 years ago
12

In these weeks readings, we learned about the CIA Triad and how each exhibits dependence on the other. Give examples of how fail

ure of one security property (confidentiality/integrity/availability) can lead to the failure of the others. How does a password or authentication relate to this situation?
Computers and Technology
1 answer:
nikklg [1K]3 years ago
6 0

Answer:

Confidentiality, integrity, and availability make up the CIA (or security) triad. We rely on each prong of this triangle for the purpose of keeping our resources secure and unaltered.

Explanation:

Confidentiality, integrity, and availability make up the CIA (or security) triad. We rely on each prong of this triangle for the purpose of keeping our resources secure and unaltered. For example, if a person intercepts data we are sending, then confidentiality has been breached and data is no longer secure. In the same light, if a person changes data stored in files than that integrity has been compromised. Finally, if there is a disruption, due to nature or human error/malice, availability is lost. Loss of one security directly effects the other factors of the triad.

Let’s take the loss of availability into consideration. A major hurricane hits the east coast. This hurricane causes a massive power outage. For the reason being that major hurricanes do not occur on the east coast, security teams did not account for this sort of natural disaster. As a result, many people are unable to access files or applications on their computer; servers are down all over the east and people are now not able to log into bank accounts, stock portfolios, etc. This is a major loss of information.

Password are kept secret because they need not to be shared. Password is used to shield information. The CIA triad requires that organizations and individual users must always take caution in maintaining confidentiality, integrity and availability of information and password is a means.

You might be interested in
Why do Linux administrators prefer to give sudo access to application teams instead of letting them su to root?
likoan [24]

Answer:

Explanation:

some distros like ubuntu do not even allow su to switch to root. furthermore the su to root is dangerous because the user becomes the all-powerful administrative account, so no warnings are issued if the application team user tries to do something system-breaking.

8 0
2 years ago
Super computer in nuclear energy ​
satela [25.4K]

Answer:

Dubbed “El Capitan,” the supercomputer is part of the Exascale Computing Project, a DOE effort to increase computing power so that the department can run highly advanced simulations and modelling of the United States' nuclear arsenal. These simulations help alleviate the need for underground testing.

4 0
3 years ago
2 examples of miniature storage media ?
jeka94

Answer: Flash memory cards, USB drives and tiny hard disks.

Explanation:

6 0
3 years ago
Read 2 more answers
What would happen if you clicked on the Show Desktop icon on your computer screen? The system tray would appear. All open window
Sholpan [36]
<span> All open windows would be minimized</span>
7 0
3 years ago
Read 2 more answers
What are the three fundamental principals of mnemonics? <br><br>HELP FASTTT!
muminat

Answer:

The three fundamental principles underlying the use of mnemonics are imagination, association, and location.

Explanation:

8 0
3 years ago
Other questions:
  • A ____ client locates all or most of the processing logic on the server.
    11·1 answer
  • You asked your colleague to provide feedback on a blog post you recently wrote. When they sent you their feedback, they made edi
    10·1 answer
  • Write a program that continually prompts the user for an integer input until input is entered that is less than 0. Each input th
    9·1 answer
  • Which is an example of Raw Input?
    11·1 answer
  • Suppose you have one particular application that is trying to send data on the Internet but none of the data is making it to the
    15·2 answers
  • Before you give your presentation to an audience, you should make sure that your ideas are organized in a clear and meaningful w
    8·2 answers
  • The physical elements needed for the production of digital media, such as computers, servers, and so on are called the {Blank}
    8·1 answer
  • You’re having trouble connecting to the Internet so you call your Internet service provider for help. They need to know the perm
    15·1 answer
  • Why use LinkedIn automation for LinkedIn?
    10·1 answer
  • Ou have recently issued new mobile phones to the sales team in your company. Each phone has the ability to store and transmit en
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!