1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amid [387]
3 years ago
12

In these weeks readings, we learned about the CIA Triad and how each exhibits dependence on the other. Give examples of how fail

ure of one security property (confidentiality/integrity/availability) can lead to the failure of the others. How does a password or authentication relate to this situation?
Computers and Technology
1 answer:
nikklg [1K]3 years ago
6 0

Answer:

Confidentiality, integrity, and availability make up the CIA (or security) triad. We rely on each prong of this triangle for the purpose of keeping our resources secure and unaltered.

Explanation:

Confidentiality, integrity, and availability make up the CIA (or security) triad. We rely on each prong of this triangle for the purpose of keeping our resources secure and unaltered. For example, if a person intercepts data we are sending, then confidentiality has been breached and data is no longer secure. In the same light, if a person changes data stored in files than that integrity has been compromised. Finally, if there is a disruption, due to nature or human error/malice, availability is lost. Loss of one security directly effects the other factors of the triad.

Let’s take the loss of availability into consideration. A major hurricane hits the east coast. This hurricane causes a massive power outage. For the reason being that major hurricanes do not occur on the east coast, security teams did not account for this sort of natural disaster. As a result, many people are unable to access files or applications on their computer; servers are down all over the east and people are now not able to log into bank accounts, stock portfolios, etc. This is a major loss of information.

Password are kept secret because they need not to be shared. Password is used to shield information. The CIA triad requires that organizations and individual users must always take caution in maintaining confidentiality, integrity and availability of information and password is a means.

You might be interested in
Hamish has created a website with an online booking system for his salon appointments. He wants to engage more with his customer
zubka84 [21]

Answer:

  1. Gather customer feedback: Email Survey
  2. Tell customers about the extended opening hours: Social Media Page
  3. Show customers Hamish’s latest hair looks: An online gallery
  4. Help customers find the new salon: A map

Explanation:

1. By sending a questionnaire or survey via email, Hamish can gather customer feedback. Customers can answer these questionnaires directly in attached questions. They can also give feedback over email. Email survery is an economical way to collect feedback and can be sent to a many customers at the same time.

2. Hamish can tell customers about opening hours by a Social Media Page is a mean to assist social media accounts through QR Codes. He can update with his salon information via this web page. When customers scan can see salon's logo, information etc on this page in order to follow.

3. Hamish can display his latest hair looks through an online gallery by sharing his photos to many people. These images are stored, organized  displayed and shared on the website (online gallery). This is a better option than using expensive albums and hard copies.

4. Hamish can help customers to find a new salon by providing a map on his website. This makes easier for customers to locate the new salon as map provides with the navigation information. Customers can get a route  from their current location to the salon.

5 0
3 years ago
Select the correct answer.
siniylev [52]

Answer:A

Explanation: J pegs are easily saved and accessed anywhere and show good quality

8 0
3 years ago
The three tasks within data harmonization, namely: data consolidation, data cleansing, and data formatting use techniques called
-BARSIC- [3]

The three tasks within data harmonization, namely: data consolidation, data cleansing, and data formatting use techniques called harmonization rules that implement those tasks -The statement is true

Explanation:

Data harmonization refers to the process of combining the data of varying files and formats ,name conventions and columns and transforming the same into one data set.

Data harmonization refers to the process of integrating multiple data source into a single data set.

By adopting the Data harmonization technique we can reduce the problem of redundant data and conflicting standard

The name harmonization is an analogy to the process to harmonizing discordant music.

The goal of data harmonization is to find commonalities, identify critical data that need to be retained, and then provide a common standard.

6 0
4 years ago
What's the name of the file mainly used to save power point
son4ous [18]
.PPT is the extention for the files downloaded from Powerpoint.
7 0
3 years ago
Read 2 more answers
Under which menu would you be able to see the number of continuous track minutes available on each mounted hard drive at the cur
Crazy boy [7]

Answer:

looooollll

Explanation:

yooooooooo u good

3 0
2 years ago
Other questions:
  • Formatting can be applied to
    10·2 answers
  • What consist(s) of a series of related instructions that tells the computer what to do and how to do it
    9·1 answer
  • When is a wrecker considered to be an emergency vehicle?
    12·1 answer
  • ZeroIt is a function that takes one argument and returns no value. The argument is a pointer to int. The function stores the val
    15·1 answer
  • There is a class called Roster whose constructor takes a List of tuples with the names of students and their grades in the class
    13·1 answer
  • You can use _____ to track the state of each user in the application.
    8·1 answer
  • My sister told me an extremely funny joke. what is the direct object for this sentence ?
    6·1 answer
  • Please help me i’ll give you brainlist
    13·1 answer
  • A software development team needs to upgrade a program, but the team members are having trouble understanding the program code a
    7·1 answer
  • Can we use a data type as a condition in C++?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!