1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amid [387]
3 years ago
12

In these weeks readings, we learned about the CIA Triad and how each exhibits dependence on the other. Give examples of how fail

ure of one security property (confidentiality/integrity/availability) can lead to the failure of the others. How does a password or authentication relate to this situation?
Computers and Technology
1 answer:
nikklg [1K]3 years ago
6 0

Answer:

Confidentiality, integrity, and availability make up the CIA (or security) triad. We rely on each prong of this triangle for the purpose of keeping our resources secure and unaltered.

Explanation:

Confidentiality, integrity, and availability make up the CIA (or security) triad. We rely on each prong of this triangle for the purpose of keeping our resources secure and unaltered. For example, if a person intercepts data we are sending, then confidentiality has been breached and data is no longer secure. In the same light, if a person changes data stored in files than that integrity has been compromised. Finally, if there is a disruption, due to nature or human error/malice, availability is lost. Loss of one security directly effects the other factors of the triad.

Let’s take the loss of availability into consideration. A major hurricane hits the east coast. This hurricane causes a massive power outage. For the reason being that major hurricanes do not occur on the east coast, security teams did not account for this sort of natural disaster. As a result, many people are unable to access files or applications on their computer; servers are down all over the east and people are now not able to log into bank accounts, stock portfolios, etc. This is a major loss of information.

Password are kept secret because they need not to be shared. Password is used to shield information. The CIA triad requires that organizations and individual users must always take caution in maintaining confidentiality, integrity and availability of information and password is a means.

You might be interested in
Plane eyes I don't know
FrozenT [24]
IFLY is probably what it was.
3 0
3 years ago
Taking a suitable example in c language explain the of call by value and call by reference concepts.
Degger [83]

Answer: The difference between call by value and call by reference is that in call by value the actual parameters are passed into the function as arguments whereas in call by reference the address of the variables are sent as parameters.

Explanation:

Some examples are:

call by value

#include <stdio.h>  

void swap(int, int);

int main()

{  int a = 10, b= 20;

 swap(a, b);

 printf("a: %d, b: %d\n", a, b);

}  

void swap(int c, int d)

{

 int t;

 t = c; c = d; d = t;

}  

OUTPUT

a: 10, b: 20

The value of a and b remain unchanged as the values are local

//call by reference

#include <stdio.h>

 void swap(int*, int*);

 int main()

{

 int a = 10, b = 20;

 swap(&a, &b);   //passing the address

 printf("a: %d, b: %d\n", a, b);

}

void swap(int *c, int *d)

{

 int t;

 t = *c; *c = *d; *d = t;

}

OUTPUT

a: 20, b: 10

due to dereferencing by the pointer the value  can be changed which is call by reference

8 0
3 years ago
A computer has three main modules that have individual reliabilities of 0.77, 0.94, and 0.81. Because of recent failures, manage
Artemon [7]
Yo también necesito ayuda con esto:(
6 0
3 years ago
What is the largest decimal value you can represent, using a 86-bit signed<br> integer?
Nataly [62]

Answer:

2^{85}-1

Explanation:

Considering the number are stored using binary notations.

If there are total 86 bits and 1 bit is used as sign bit. Then in total one can have 2^{85} bit combinations since a bit can be either stored as 0 or as 1.

Therefore,  the largest number that can be stored will be 2^{85}-1.

To understand it in better way let's scale down the problem to 3 bits representation. The largest number that can be stored using 3 bits is 111 which in decimal form is 7 and is equal to 2^{3}-1.

4 0
3 years ago
Terrence smiles at his customers, helps his coworkers, and stays late when needed. What personal skill does Terrence demonstrate
Salsk061 [2.6K]
Friendliness or it shows that he follows the rules
6 0
3 years ago
Read 2 more answers
Other questions:
  • Give two separate print statements: one will print your name, the other will print your major. Ensure that both will print on th
    15·1 answer
  • Robert's employer has agreed to pay half the tuition for Robert to complete his college degree. This benefit is known as what?
    7·2 answers
  • What does the binary odometer show about representing large numbers​
    15·1 answer
  • . How is using 0 / 1 or true / false in specifying digital an abstraction?
    11·1 answer
  • AYUDAAAA!!!!! URGENTE!!!!!!1<br> ¿para que sirve la "BIG DATA"?
    9·1 answer
  • A company has a hybrid ASP.NET Web API application that is based on a software as a service (SaaS) offering.Users report general
    9·1 answer
  • Braxton is writing a program to design t-shirts. Which of the following correctly sets an attribute for color?
    7·1 answer
  • Can someone help me with this code please explain it to me in simple way
    15·1 answer
  • How to square a number in java.
    15·1 answer
  • You are a software engineer at a company where management routinely encourages you and your colleagues to use pirated software.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!