1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lys-0071 [83]
4 years ago
12

The McCumber Model is a cube with three faces; each face has three items. It is intended to cause us to think about three areas

of information with respect to information security. What are the three areas? That is, what do the three faces of that cube represent?
Computers and Technology
1 answer:
bagirrra123 [75]4 years ago
8 0

Answer:

The three faces are information states, security goals, countermeasures.

Explanation:

Each face has different subjects about Informatics security, we will start with:

Information States

Storage is how we save data, for example, USB or hard drive.

Transmission is how we transfer data.

Process is how we make operations with data.

Security goals

Confidentiality is not showing data to unauthorized people.

Integrity is not modified data accidentally.

Availability is access to data timely.

Countermeasures

Politics is saving data with rules.

Human factors is training people in Informatics security.

Technology is software or hardware for Informatics security.

You might be interested in
E-governance is the only solution against corruption. justify the statement in context of nepal​
notka56 [123]

Answer:

Following are the solution to this question:

Explanation:

The E-government implies use as part of the government systems to offer SMART, which is used to manage smart governance, ethics or accountability, sensitivity, and transparency. It is the research teams, that also shown that policies were progressing in India's creation of information technology. It is also argued against reducing the risk of bribery through improved public official surveillance and reducing its need for citizen engagement with porters with key services.

6 0
3 years ago
What is security in Technology<br>​
maria [59]

Answer:

IT security is a set of cyber security strategies that prevents unauthorized access to organizational assets such as computers, networks, and data.

3 0
3 years ago
Read 2 more answers
Which type of connection to the Internet is capable of the fastest transfer rates
dem82 [27]

That's a fiber connection direct to the internet service provider,
and a whopping monthly charge.

5 0
3 years ago
Read 2 more answers
Answer pls pls pls pls pls ​
nataly862011 [7]

Answer:

identify materials to create a prototype

6 0
2 years ago
Mika forgot to put in the function name in his function header for the code below. What would be the best function
kondaur [170]

Answer:

I think it's A, def drawDiamond():

Explanation:

5 0
4 years ago
Other questions:
  • What are some options available when using the Replace feature?
    13·1 answer
  • The major difference between a calculator and a computer, when performing calculations, is that a
    10·1 answer
  • Convert 234.43 (base 7) to base 10
    7·1 answer
  • Who invented the ENIAC? More than one answer may apply.
    14·1 answer
  • If your machine is not used as a server and is not on a local network, what packet-filtering strategy should you use?A. Block al
    12·1 answer
  • Consider the packets exchanged in TCP connection setup between Host A and Host B. Assume that Host A's initial sequence number i
    7·1 answer
  • Which of the following are examples of software? (Select all that apply)
    9·2 answers
  • Complete the sentence
    6·2 answers
  • You cannot be everywhere at once, but your freedom allows you to
    5·1 answer
  • The most important part of a computer​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!