1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
3 years ago
12

1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)

and justify your answer:
a. Someone has copied your credit card and CVV number.
b. If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.”
c. If the attacker has deleted the installed copy of the Microsoft Office application from your laptop.
Computers and Technology
1 answer:
just olya [345]3 years ago
6 0

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

You might be interested in
Arun is 5 years older than Anu. five years ago, the ratio of their ages was 3:2 . find their present age​
vagabundo [1.1K]

Answer: Arun is 15 years old and Anu is 10 year old

Explanation:

Multiple 5 by 3, Multiple 5 by 2 there goes you answer please give 5 stars and Thanks

3 0
4 years ago
Read 2 more answers
An understanding of basic psychology can help design and marketing teams ensure they meet their intended audience.
Kamila [148]

Answer:

um true i think cause to understand something or someone you have to help it to find it place in the world by make design for them and have a team to help you so they can that there audience if that help you plz mark me brainliest if not then you don't have to

Explanation:

5 0
3 years ago
Read 2 more answers
Write the definition of a function named count that reads all the strings remaining to be read in standard input and returns the
spayn [35]

Answer:

The function written in C++

int str(string word) {

int count = 1;

for(int i =0; i<word.length();i++) {

 if(word[i] == ' ') {

  count++;

 }

}

return count;

}

Explanation:

This line defines the function

int str(string word) {

This line initializes count to 1

int count = 1;

This line iterates through the input string

for(int i =0; i<word.length();i++) {

This line checks for blank space

 if(word[i] == ' ') {

Variable count is incremented to indicate a word count

  count++;

 }

}

return count;

}

<em>See attachment for full program</em>

Download cpp
8 0
3 years ago
Which software is used to play, create, and modify audio and video files?
Alenkasestr [34]
Windows Movie Maker, iMovie, Final Cut Pro (x), QuickTime?
8 0
4 years ago
Read 2 more answers
The following is part of a log file taken from the machine on the network with the IP address of 192.168.1.106:__________.
Phantasy [73]

Answer:

Port scan targeting 192.168.1.106.

Explanation:

In the following question, there is some part of the question and options is missing.

In the following statement, when a file log is taken from the computer system which has Internet Protocol address is given in the statement and by the further details of the statement in which time and the port destination by examine those details of the Internet Protocol, the following port scan targeting the IP address 192.168.1.106.

3 0
3 years ago
Other questions:
  • A rectangular box that displays information or a program is called
    13·1 answer
  • 1.using synonyms can help make ur writing more________
    11·1 answer
  • Select two netiquette guidelines. In a paragraph of no less than 125 words, explain why these guidelines make professional onlin
    9·1 answer
  • When users talk about font size,
    10·2 answers
  • An investigator has proposed a multi-site study of PSA (Prostate Specific Antigen) test results among patients with prostate can
    6·1 answer
  • ? I don’t understand
    8·2 answers
  • What is the build in libary function to compare two strings?​
    15·1 answer
  • In cell B13, create a formula without a function using absolute references that subtracts the values of cells B5 and
    13·1 answer
  • where should a user disable virus protection settings that might prevent the boot area of the hard drive from being altered? a.
    14·1 answer
  • Which utilities are excellent examples of connectivity software, applications that enable you to determine if a connection can b
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!