1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAXImum [283]
3 years ago
7

Which is a concept of the CIA of Computer Security

Computers and Technology
1 answer:
Ainat [17]3 years ago
8 0

Answer:

These three letters stand for confidentiality, integrity, and availability, otherwise known as the CIA Triad

Explanation:

These three letters stand for confidentiality, integrity, and availability, otherwise known as the CIA Triad

You might be interested in
The icons to insert pictures and clip art in the PowerPoint application are located in the _____ grouping on the Insert tab.
saul85 [17]
The icons to insert pictures and clip art are located in the images grouping on the insert tab.
3 0
4 years ago
PLEASE HELP!!! What are the benefits of online notebooks? Check all that apply.
Kipish [7]

They allow users to store files.

They allow users to share files.

They help users organize assignments.

They allow users to clip information from web pages.

4 0
3 years ago
Read 2 more answers
Where might an awareness of Greek word origins be helpful?
devlian [24]
Greek word origins be helpful at a doctors offics
8 0
3 years ago
HELP URGENTLY!!!!!
Ganezh [65]
Which field TCP header is not typically used in modern networks
5 0
3 years ago
An intruder with malicious intent breaks into an office and steals a hard drive
Leya [2.2K]

Based on the above, the type of security is illustrated in this example is known as data security.

<h3>What is Data security?</h3>

This is known to be the act of keeping safe data from unauthorized access and its corruption in all of its lifecycle.

Note that in the case above, the intruder is interested in the companies data and as such,  the type of security is illustrated in this example is known as data security.

Learn more about  security from

brainly.com/question/15668437

#SPJ1

6 0
2 years ago
Other questions:
  • The information security organization performs a significant role in the implementation of solutions that mitigate risk and cont
    6·1 answer
  • What risks, threats, and vulnerabilities are prominent with wlan infrastructures?
    7·1 answer
  • What happens if you give false information on your driver license application?
    12·1 answer
  • The video game machines at your local arcade output coupons depending upon how well you play the game. You can redeem 10 coupons
    14·1 answer
  • Two strings, and , are called anagrams if they contain all the same characters in the same frequencies. For example, the anagram
    13·1 answer
  • Which of the following allows the transmission of voice and often video communication over the internet?
    12·1 answer
  • Write a program named Deviations.java that creates an array with the deviations from average of another array. The main() method
    8·1 answer
  • Write a menu-based program in C++ for an input restricted dequeue using Linked List consist of
    9·1 answer
  • Place the steps for attaching a file to a message in order from top to bottom.
    12·1 answer
  • ANSWER QUICKLY!!! <br><br> What is an advantage of digital portfolios?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!