1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldfiish [28.3K]
3 years ago
11

Preserving confidentiality, integrity, and availability is a restatement of the concern over interruption, interception, modific

ation, and fabrication.
i. Briefly explain the 4 attacks: interruption, interception, modification, and fabrication.
ii. How do the first three security concepts relate to these four attacks
Computers and Technology
1 answer:
Roman55 [17]3 years ago
7 0

Answer and Explanation:

I and II answered

Interruption: interruption occurs when network is tampered with or communication between systems in a network is obstructed for illegitimate purposes.

Interception: interception occurs when data sent between systems is intercepted such that the message sent to another system is seen by an unauthorized user before it reaches destination. Interception violates confidentiality of a message.

Modification: modification occurs when data sent from a system to another system on the network is altered by an authorized user before it reaches it's destination. Modification attacks violate integrity, confidentiality and authenticity of a message.

Fabrication: fabrication occurs when an unauthorized user poses as a valid user and sends a fake message to a system in the network. Fabrication violates confidentiality, integrity and authenticity.

You might be interested in
Q. Describe the T.V. as an ICT tool.​
Vikentia [17]

Answer:

TV or modern televisions are also a type of ICT tool because we get a wide amount of information about mass communication through the various news channels on the TV. TV is now also the most popular as well as a cheap medium of mass communication.

3 0
3 years ago
Zohan uses the following analogy to describe a concept of object-oriented programming. A button can have many uses. When it is p
Vika [28.1K]

Answer:

Polymorphism

Explanation:

You can have a basic button class that gets inherited by other classes.

class Button {

function pushButton(){}

}

class ElevatorButton extends Button{};

class BigRedButton extends Button{};

With these new classes, they inherit from the basic button class. They can decide what happens when the method pushButton() is called.

You don't need to worry about what pushButton() actually does, you can just call it if the object is of the type "Button" and you can expect it to work.

4 0
2 years ago
The declarations and statements that compose the method definition are called the __________.
Fiesta28 [93]

Answer:

a. method body.

Explanation:

A method contains the following components:

  • method name
  • method arguments
  • method return type
  • method implementation code

All of these together constitute the method body. The method body contains the declarations and statements constituting the method definition.

Apart from this, when the method is invoked at runtime, it needs to be called with method-name and the actual parameter list which gets substituted for the formal parameters in the method body.

8 0
3 years ago
An important result of the development of anesthesia was?
Ksju [112]
It could be #2 since the patient would be asleep under the anesthesia they would be able to perform amputations more often since the patient would not be able to feel the pain during the procedure. It could also be #3 because if the patient is asleep you could use a more direct approach instead of avoiding certain procedures that would put the patient in a lot of pain if it was performed while they were awake. In all I would say the answer is #2, please comment which is the right answer, thank you.
7 0
4 years ago
Self contained sequences of actions to be performed are?
Firlakuza [10]

Answer:

Self contained sequences of actions to be performed are algorithms. - b

6 0
3 years ago
Other questions:
  • ____ allows someone browsing the internet to click on words or phrases, enter his or her phone number, and continue browsing
    11·2 answers
  • john wants to view sarah's assignment files on his computer. but he cannot open them because of version problems. which upgrade
    14·2 answers
  • According to the partnership for 21st-century learning critical thinking ability includes all the following skills except
    15·1 answer
  • The Microsoft Developer Network is an example of a software development company. software development marketplace. developer for
    5·1 answer
  • 1. Think about the various ways in which you have seen hackers portrayed in popular media over the past few years. Are they hero
    11·1 answer
  • Give 5 uses of software and hardware.
    15·1 answer
  • _____ is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a compan
    8·1 answer
  • In addition to text with styles based on the Normal style, what text will be affected if you modify the Normal style?
    7·2 answers
  • To obtain the desired speedup, make sure your new function recursively calls itself no more than once in the body of the method.
    8·1 answer
  • Dis-cord and/or snap????????????? Im 13 ! and a girl :)))))
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!