1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvasek [131]
3 years ago
8

Give an example of a situation in which a compromise of Confidentiality leads to compromise in Integrity.Situation where confide

ntiality leaks lead to compromised integrity would the the compromise of a password or cryptic key that is ultimately protecting the integrity of the system.
Computers and Technology
1 answer:
il63 [147K]3 years ago
7 0

Answer: An example of such a scenario would be when the user name and password meant to allow access to a customers bank account statement is cracked by unauthorized people this causing alteration (in the form of data diddling attacks) in the data contained in the statement. This is a compromise in integrity.

Explanation:

Confidentiality entails securing things people want to remain secret. An account statement of a bank customer is a confidential document which is to be kept secret. A password allows access to it.

Integrity implies receiving a sent data/information as accurately as it came from a sender. A data diddling attack alter integrity because the original information is altered by an unauthorized person.

You might be interested in
I just want to ask if some one know an online school program that offer a live session and the cost of it not to expensive. for
Alenkasestr [34]

Answer:Apple

               Sin

                 Sorry

                 

                   Forever

                   Art

                   Round

                   Table            

         

 Explanation:

5 0
3 years ago
In the 21st century organization we will see:
kykrilka [37]

Answer: All of the above

Explanation: As the technology is getting improved and advanced time to time, it will put a huge impact on various sections of organization.

The advancement in the IT infrastructures will be seen by the improvement in the software,networks, data centers, hardware etc and their functioning.This will lead increase the focus of the technology towards the IT infrastructure.

Security is the feature that requires to be developed throughout the time as hacker and attackers come up with various attacks and other malicious activity to steal the confidential data and information .Thus security constantly needs to be improved and focused which will continue to happen in 21st century.

Business of organizations are becoming online and this will tend the organizations to become more indulged online business or e-business in future as it provides more benefits and vast coverage .Thus, all the options are correct.

5 0
4 years ago
It is the ornamentation of textiles and other material with needle work
vesna_86 [32]
A! Embroidery is the ornamentation of textiles using needle work

6 0
3 years ago
Julie has a difficult time seeing her computer Screen and uses adaplive technology tools to help he see better. One of the tools
andreyandreev [35.5K]

Answer:

200%

Explanation:

While Julie has some difficulties reading short words, she can zoom the size of the texts by two hundred percent to make the process faster. A hundred percent or less would have much more difficulty reading short words.

4 0
3 years ago
Read 2 more answers
Supplies/material used in iron​
Novay_Z [31]
The raw materials used to produce pig iron in a blast furnace are iron ore, coke, sinter, and limestone. Iron ores are mainly iron oxides and include magnetite, hematite, limonite, and many other rocks. The iron content of these ores ranges from 70% down to 20% or less.
3 0
3 years ago
Other questions:
  • 1. Which of the following are considered CAD powerhouses?
    6·1 answer
  • How many bits are required to address a 1mx8 main memory if main memory is byte addressable?
    6·1 answer
  • I need help making this table in html code I have some of chart done but idk where to go after the 6:30pm part
    13·1 answer
  • At what two layers of the osi model are lan and wan protocols likely to differ??
    7·1 answer
  • You easily can give slides in a presentation a professional and integrated appearance by using a placeholder.
    11·1 answer
  • How many times will the while loop that follows be executed? var months = 5; var i = 1; while (i < months) { futureValue = fu
    10·1 answer
  • Write a JAVA program containing a method called hasEight(), which takes an int as input and returns true if the number contains
    14·1 answer
  • Adobe Indesign project 4 museum indesign file. The instructions are 70 pages long I cant sit still long enough to read them
    11·1 answer
  • Compute series multiplier resistors RM = 100Ω:
    8·1 answer
  • Project: Digital Media and Business
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!