1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zavuch27 [327]
3 years ago
6

How is the cia triad used to evaluate encryption methods?

Computers and Technology
1 answer:
Lyrx [107]3 years ago
6 0

Answer:

The CIA triad is an important concept in data security, which helps to prevent data from being seen by unauthorized parties, changed, and provide uninterrupted access to data when needed.

Explanation:

CIA triad stands for confidentiality, integrity, and availability. confidentiality is a concept in the triad that prevents unauthorized users from seeing the data, by access control and encrypting the data using various algorithms.

The Integrity of the data prevents the change of the data by unauthorized users. It uses an algorithm for drafting a calculative check to compare the actual data sent and the data received.

Availability tries to break the barrier of data shortage or data unreachable events, by providing multiple access or fault tolerance to data storage.

You might be interested in
Can someone help me plz
xxMikexx [17]

Answer:

ok but on what tho

Explanation:

plz explain yourself

8 0
3 years ago
Read 2 more answers
What activities are the most likely to infect your computer with a virus? Check all that apply
Alex17521 [72]
Opening unfamiler emails and visiting unknown websites
4 0
3 years ago
Read 2 more answers
Discuss Hardware is useless without software?​
Alexus [3.1K]

Explanation:

Hardware is useless without software because the machinery will not and cannot do anything without programming to tell it what to do. Without an operating system, the computer can't do anything. Without other software, like Microsoft Office, you can't type anything or listen to music or watch video or anything

7 0
2 years ago
Which of the following is an example of constructive criticism for a friend who speaks too softly?
Dmitry [639]
C is correct..

Please vote my answer branliest! Thanks.
8 0
3 years ago
Read 2 more answers
Pressing the Ctrl+Home keys moves the insertion point to the
rewona [7]
I'm going to go with A
5 0
3 years ago
Other questions:
  • This is not school related in anyway but. I used to play this videogame on my computer years ago, but i cannot remember the name
    13·2 answers
  • Someone please help fast! I’m taking the test rn and I don’t understand this!!!!!!
    15·1 answer
  • If the physical memory size is doubled without changing any of its other parameters, the number of entries in the page table
    5·1 answer
  • Henry, a graphic artist, wants to create posters. Which software should Henry use for this purpose?
    13·1 answer
  • George works for a print newspaper in which of these areas would you be interested to hire new recruits for the newspaper WHICH
    11·1 answer
  • You are configuring a firewall to use NAT. In the configuration, you map a private IP address directly to a persistent public IP
    9·1 answer
  • Which Backstage view feature helps you to specifically remove customized information from a document? Protect Document Feedback
    14·1 answer
  • Binary is best interpreted by a computer because ​
    12·2 answers
  • 1k bits equals to how many bits
    12·1 answer
  • __________, a level beyond vulnerability testing, is a set of security tests and evaluations that simulate attacks by a maliciou
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!