1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andru [333]
3 years ago
11

A bank system mainframe is struck by a DDoS attack and goes offline. Customer’s cannot log on to their accounts. Which element o

f C.I.A. has been violated?
Computers and Technology
1 answer:
FromTheMoon [43]3 years ago
7 0

Answer:

Availability

Explanation:

C.I.A which in computer engineering means Confidentiality, Integrity, and Availability. It is often referred to as the C.I.A triad.

The C.I.A triad is considered to be three principles of information security. Based on the type of impact on any security breach, can leads to violation of any or more that one of the CIA principles.

Hence, in this case, since the DDoS attack only resulted in the system's mainframe going offline and the prevention of customers to log on to their accounts. This shows that "Availability" which is one of the CIA principles, has been violated.

Availability in this sense is that the customers should have valid access to their resources whenever needed.

You might be interested in
Determine the efficiency and big-O notation for the following algorithm:
Anon25 [30]

Answer and Explanation:

To calculate Big O, go through each line of code and determine O(!), O(n) and return your calculation.

For example,

In O (5 +6n), where 6 5 represent five instances of O(1), and 6 represent the 6 O(n).

We compute the time complexity of the algorithm. We get the result, just an estimation. In given algorithms, run time in milliseconds has been provided, such as in T (1) algorithm process in 512 milliseconds and T(2) algorithms process 8129 milliseconds. But big O notation not measured in milliseconds. Information given is not enough to calculate the big O notation.

       

8 0
4 years ago
Assume that the int variables i, j and n have been declared, and n has been initialized. Write code that causes a "triangle" of
makvit [3.9K]

Answer:

The code that will cause the triangle of  asterisks is given by;

for (i=1; i<=n; i++){

for (j=1; j<=i; j++)

cout << "*";

cout << "\n";

}

Explanation:

6 0
3 years ago
Which part of a computer s ip address configuration indicates the portion of the address that specifies the network address?
vivado [14]
The NETWORK mask is and'ed with the IP address to get the network number.

Example:

192.168.1.1 & 255.255.255.0 = 192.168.1.0/24

It's worth the effort to do this in binary, it makes much more sense.
4 0
3 years ago
Which of the strategies below are likely to increase audience attention?
coldgirl [10]

Answer:

Use lots of different animation styles on each slide.

Explanation:

3 0
3 years ago
Who has a relationship like this quote?
lora16 [44]

Answer:

me

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Can somebody help me with this problem
    10·1 answer
  • Can you find the ip address from a physical address
    13·1 answer
  • The UML models operations by listing the operation name preceded by an access modifier. A(n) ________ indicates a public operati
    7·2 answers
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    11·1 answer
  • What type of Microsoft Server serves as an email server?
    7·2 answers
  • What is data that originated in another program or format?
    7·1 answer
  • What type of security software prevents, detects, and removes malware that tries to collect personal information or change compu
    13·1 answer
  • The internet's data gathways rely on what kind of hardware devies to route data to its destination?
    14·1 answer
  • Write fade in shorthand​
    11·1 answer
  • Outline various methods of collecting data
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!