1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zavuch27 [327]
4 years ago
6

How is the cia triad used to evaluate encryption methods?

Computers and Technology
1 answer:
Lyrx [107]4 years ago
6 0

Answer:

The CIA triad is an important concept in data security, which helps to prevent data from being seen by unauthorized parties, changed, and provide uninterrupted access to data when needed.

Explanation:

CIA triad stands for confidentiality, integrity, and availability. confidentiality is a concept in the triad that prevents unauthorized users from seeing the data, by access control and encrypting the data using various algorithms.

The Integrity of the data prevents the change of the data by unauthorized users. It uses an algorithm for drafting a calculative check to compare the actual data sent and the data received.

Availability tries to break the barrier of data shortage or data unreachable events, by providing multiple access or fault tolerance to data storage.

You might be interested in
Iisa is creating a resume in which section should she mention her career goals
spayn [35]
Objective (sometimes called objective selection)
8 0
4 years ago
Differences of a desktop computer and a laptop
Ilya [14]

Answer:

Desktop can't move easily, not portable. Laptop very portable.

Explanation:

6 0
3 years ago
Select each of the tasks that you could complete using a word processor.
Korolek [52]

Answer:

  • Create a table that lists your favorite movies and actors
  • Write a manuscript of a book
  • Make a list of homework assignments

Explanation:

Word processing tool is used for different purposes such as typing reports, preparing notes and books etc.

Now from the given options, following tasks can be performed using a word processor

  • Create a table that lists your favorite movies and actors
  • Write a manuscript of a book
  • Make a list of homework assignments
4 0
3 years ago
Read 2 more answers
The tiny memory cards used by digital cameras and mobile devices are an example of ____ storage.
Shalnov [3]
<span>The tiny memory cards used by digital cameras and mobile devices are an example of Solid State storage.</span>
5 0
4 years ago
After you create a pie chart, you can move it to its own chart sheet.
katen-ka-za [31]

Answer:

I think it's either true or false

Explanation:

5 0
3 years ago
Other questions:
  • William is an amateur photographer who plans to create a portfolio to improve his career prospects. He wants to capture a mother
    6·1 answer
  • True or False? In C++, the expression (a + b / c) / 2 is implicitly parenthesized as ((a + b) / c) / 2.
    9·1 answer
  • Can you give me a long list of anime
    6·2 answers
  • Psychographics may also be called A. personality analytics. B. social group dynamics. C. lifestyle analysis. D. opinion insight.
    6·1 answer
  • The variable most_recent_novel is associated with a dictionary that maps the names of novelists to their most recently published
    12·1 answer
  • See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will pri
    6·1 answer
  • Write a program that declares an array named myArray with 8 components of the type int. Initialize the array to 8 values that th
    6·1 answer
  • What makes a computer a computer?​
    12·2 answers
  • Which strategies for effective presentations is Ian using in his opening? Check all that apply.
    8·2 answers
  • Difference between authentication and authorization.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!