1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldfiish [28.3K]
3 years ago
11

Preserving confidentiality, integrity, and availability is a restatement of the concern over interruption, interception, modific

ation, and fabrication.
i. Briefly explain the 4 attacks: interruption, interception, modification, and fabrication.
ii. How do the first three security concepts relate to these four attacks
Computers and Technology
1 answer:
Roman55 [17]3 years ago
7 0

Answer and Explanation:

I and II answered

Interruption: interruption occurs when network is tampered with or communication between systems in a network is obstructed for illegitimate purposes.

Interception: interception occurs when data sent between systems is intercepted such that the message sent to another system is seen by an unauthorized user before it reaches destination. Interception violates confidentiality of a message.

Modification: modification occurs when data sent from a system to another system on the network is altered by an authorized user before it reaches it's destination. Modification attacks violate integrity, confidentiality and authenticity of a message.

Fabrication: fabrication occurs when an unauthorized user poses as a valid user and sends a fake message to a system in the network. Fabrication violates confidentiality, integrity and authenticity.

You might be interested in
When technology advances which of the following always takes place?
natulia [17]
When technology advances, the option that always takes place is that results are improved.
As technology progresses and becomes better and better, the things we want to achieve using it become more realistic. So the result we wanted to get to become closer to us, and not just a thing that belongs to a distant future. Technological advances ALWAYS improve results, whereas the remaining options do not necessarily happen always.
6 0
3 years ago
Read 2 more answers
Edhesive AP Computer Science Coding Activity 2:
Romashka-Z-Leto [24]

Answer:

The method in C++ is as follows:

double average(int v, int w, int x, int y, int y){

   double ave = (v+w+x+y+z)/5.0;

   return ave;

}

Explanation:

This defines the average method with 5 parameters

double average(int v, int w, int x, int y, int y){

This calculates the average

   double ave = (v+w+x+y+z)/5.0;

This returns the calculated average

   return ave;

}

To call the method from the program's main, use:

<em>int main(){</em>

<em>    cout<<average(1,5,7,4,10);</em>

<em>    return 0;</em>

<em>}</em>

<em />

7 0
3 years ago
Can you help me to write a code with functions,arrays,and pointers in c++?
MrMuchimi

Answer:

Your search for complete and error-free projects in C and C++ ends here! Here, we’ve enlisted all the mini-projects, projects, games, software and applications built using C and C++ programming language — these are the projects published in our site or available with us at the moment. You can download all these projects (with source code) for free; make sure to check their individual post description as well.

First thing, most students learn C and C++ as their first programming language. They quickly become able to write programs that include functions, arrays and pointers, file handling and data structure, etc. But, when it comes to building a mini-game, an application, or a small project, incorporating all these features in one compact program becomes difficult.

In such case, reference projects always come in handy. The C and C++ projects published in our site will teach you how to get started, give you ideas and topics regarding your project, and sharpen your programming skills in C and C++. Here, you’ll find short and simple as well as long and complicated projects.

3 0
3 years ago
What is the last step in conducting a URL search
Feliz [49]
The request goes through a router or the modem to the user's ISP. 

6 0
3 years ago
Read 2 more answers
A variable that can be modified from anywhere within a program is called a?
larisa86 [58]
A - a global variable
6 0
3 years ago
Other questions:
  • Which syntax error in programming is unlikely to be highlighted by a compiler or an interpreter? a variable name misspelling a m
    6·2 answers
  • _____ is published by the U.S. Bureau of Labor Statistics. It provides up-to-date career outlook information. It is no longer av
    15·2 answers
  • Animation includes special visual and sound effects applied to text or other content. true or false.
    14·1 answer
  • All of the following are aspects of the search process except
    15·1 answer
  • A user complains that her computer is performing slowly. She tells you the problem started about a week ago when new database so
    12·1 answer
  • My sister put my phone in the microwave and I'm pretty sure the battery blew up. I'm too scared to open the microwave. What do I
    11·1 answer
  • PLZ ANSWER THESE QUESTIONS FOR 30 POINTS AND BRAINLIEST!
    9·1 answer
  • What is the purpose of the Hide Slide feature in a presentation program?
    14·1 answer
  • Only the one dose audio editors and video editors know this
    9·2 answers
  • ANSWER ASAP!!!!!!
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!