1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mina [271]
3 years ago
11

Imagine a business where there are no clear boundaries defined for data and systems ownership. As a security professional, descr

ibe some potential problems that may arise from this condition. It may be helpful to frame your analysis by describing the issues in relation to the loss of one of the CIA triad security objectives.
Computers and Technology
1 answer:
laiz [17]3 years ago
3 0

Answer:

Loss of confidentiality, integrity and Availability

Explanation:

First I would start by explaining data ownership and system ownership

<u>Data ownership</u>:

Such an owner is responsible for safeguarding data, has all rights and complete control of the data. He or she can transfer data responsibility to someone else

<u>System ownership</u>:

The responsibility here is system maintenance, taking care of system functionalities, updating system and system software.

<u>Lack of data ownership</u>:

1. This affects privacy of data as there would be no one involved in the monitoring and taking care of the data. It would be at risk as sensitive information may get out and data may even be modified.

2. Lack of data ownership could bring about inconsistency in data

3. Lack of data ownership piles up risks to data which may cause great loss to data eventually.

<u>Lack of system ownership</u>:

1. There would be no one available to take care of issues that may come up with the system

2. If system gets to be outdated, it becomes open to malware and hackers

3. Work will be unable to be completed on the system.

<u>Loss of CIA triad</u>

CIA stands for confidentiality, Integrity and Availability

1. Without data ownership there would be access to data which is unauthorized. This brings about loss in confidentiality, and there could be issues with data availability

2. If system gets malware at the absence of system owner then there would be loss in confidentiality, integrity. Hackers would take control of the system and they would be able to use data.

You might be interested in
The _____ is an information and communication-based electronic exchange environment mostly occupied by sophisticated computer an
Airida [17]

Answer:

The correct answer to the following question will be "Marketspace".

Explanation:

  • A relatively new marketing term which seems to be a simulated market place. It's an area for the electronic exchange of ideas and information in which external boundary restrictions are removed, termed as Marketspace.
  • The electronic trading world focused on connectivity often filled by advanced computer and telecommunications technology and digitized deals.

Therefore, Marketspace is the right answer.

5 0
3 years ago
According to peacemaking criminology, our society denying a citizen's basic rights is another dimension of
katovenus [111]

Answer:

Violence.

Explanation:

Peacemaking criminology believes that our justice system it's just using a different form of violence to deal with violence.

This movement states that we need to re-enter violent individuals into society, and sees crime as a direct result of a determinate social structure, such as extreme poverty, violent environments, racial hate, etc.

4 0
3 years ago
Read 2 more answers
What type of websites, which let users share personal stories and photos, became popular in the 2000s?.
Lina20 [59]

Answer:

MMORPGS was a type of website that let users share their stories and pics across the world wide web

Explanation:

8 0
3 years ago
What happens in Word 2016 when the Home ribbon tab is clicked on? A dialog box is launched, containing functions relating to the
ArbitrLikvidat [17]

A group with functions relating to font and tables will open.

3 0
3 years ago
Read 2 more answers
A jackhammer uses pressurized gas to transmit force to the hammer bit. What type of mechanical system is it?
Nadya [2.5K]
This is a pneumatic system
7 0
3 years ago
Other questions:
  • Submit your 300-word essay describing the equipment usedI in a well-equipped studio’s audio department and the training and expe
    8·2 answers
  • If you feel that an OSHA inspection is needed to get hazards corrected at your workplace which is the best option
    9·1 answer
  • One of the best examples of outcome control is the re-hiring of Steve Jobs by Apple as CEO
    14·1 answer
  • The _______________ is a priority-ordered list of the other carrier networks and frequencies it should search for when it cannot
    6·1 answer
  • Study the sentence below
    13·2 answers
  • Which of the following allows the transmission of voice and often video communication over the internet?
    12·1 answer
  • A website must have a unique address with all the following features
    14·1 answer
  • What is the outcome when a floating-point number is divided by zero?
    12·1 answer
  • Alex has composed a layout with this Image for a magazine. Which rule of composition has Alex applied?
    14·1 answer
  • What is the name of the computer that access shared resources on the network<br><br>​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!