1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amid [387]
3 years ago
12

In these weeks readings, we learned about the CIA Triad and how each exhibits dependence on the other. Give examples of how fail

ure of one security property (confidentiality/integrity/availability) can lead to the failure of the others. How does a password or authentication relate to this situation?
Computers and Technology
1 answer:
nikklg [1K]3 years ago
6 0

Answer:

Confidentiality, integrity, and availability make up the CIA (or security) triad. We rely on each prong of this triangle for the purpose of keeping our resources secure and unaltered.

Explanation:

Confidentiality, integrity, and availability make up the CIA (or security) triad. We rely on each prong of this triangle for the purpose of keeping our resources secure and unaltered. For example, if a person intercepts data we are sending, then confidentiality has been breached and data is no longer secure. In the same light, if a person changes data stored in files than that integrity has been compromised. Finally, if there is a disruption, due to nature or human error/malice, availability is lost. Loss of one security directly effects the other factors of the triad.

Let’s take the loss of availability into consideration. A major hurricane hits the east coast. This hurricane causes a massive power outage. For the reason being that major hurricanes do not occur on the east coast, security teams did not account for this sort of natural disaster. As a result, many people are unable to access files or applications on their computer; servers are down all over the east and people are now not able to log into bank accounts, stock portfolios, etc. This is a major loss of information.

Password are kept secret because they need not to be shared. Password is used to shield information. The CIA triad requires that organizations and individual users must always take caution in maintaining confidentiality, integrity and availability of information and password is a means.

You might be interested in
Which compound is obtained by the oxidation of primary alcohol with nascent oxygen​
Nookie1986 [14]

answer:

what

Explanation:

8 0
2 years ago
How would a programming language that allows programs to run on any operating system be classified?
Illusion [34]
Cross-platform.





--------------------
3 0
2 years ago
Can you help me solve this challenging activity?
diamong [38]

Answer:

user_age = int(input())

if user_age > 17 and user_age != 25:

   print("Eligible")

else:

   print("Not eligible")

Explanation:

3 0
1 year ago
1. How has ESPN handled the rise of Twitter? How has it incorporated Twitter into Sports Center?
vovangra [49]

<u>Rise of Twitter:</u>

On every sport telecast ESPN create a twitter accountants raise a sport questions related to sport telecasted. Base of sport interested person answer queries or questions so automatically incorporated to sport center

<u>Cable subscriptions:</u>

Since ESPN been telecasted through air with customer login with minimum subscription fees so end user easily login n watch the match online and live telecast. Moreover end user can watch old or missed match from archive library on its own time.

ESPN is subscription channel are also available as bundle option in hot star amazon prime video.

<u>ESPN upgrade</u>:

ESPN telecast match on season basic such as football, cricket extra. ESPN very frequently upgrade the match schedule and old archives. Sports person interviews n performance of software also is upgraded to end users.

4 0
3 years ago
Read 2 more answers
_____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard
Monica [59]
<span>Keyloggers can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC.
</span><span>The keylogger is also called keystroke logger or system monitor. This technology used to monitor and record each keystroke typed on a specific computer's keyboard. </span>
6 0
2 years ago
Other questions:
  • Problems with using a single Local Area Network (LAN) to interconnect devices on a premise include ______.
    12·1 answer
  • "The fact that we could create and manipulate an Account object without knowing its implementation details is called"
    9·1 answer
  • What is the fastest way to locate a record for updating?
    6·1 answer
  • Suppose you're currently completing an examination online. When you're finished, you click on Reset Exam. Why would you do this?
    8·1 answer
  • Jason Has A Science Video Project, As He Creats His Project, He Saves, Then Comes Back A Minute Later. The File Is Now Unreadabl
    8·2 answers
  • If your TV was showing a flat black or blue screen, or had "snow", what steps would you take to fix it?
    13·1 answer
  • Functionality testing is primarily used with ____________. firewall protection software development hardening servers server tes
    8·1 answer
  • I'm stupid and Idk how to take a pic on a Chromebook so, I want to know how to take a pic on a cromebook.
    11·1 answer
  • HELP ME ILL GIVE BRAINLY Input 50 numbers and then output the average of the negative numbers only. Write in pseudocode!
    11·1 answer
  • Edit the program provided so that it receives a series of numbers from the user and allows the user to press the enter key to in
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!