1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fantom [35]
3 years ago
12

1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)

and justify your answer:
a. Someone has copied your credit card and CVV number.
b. If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.”
c. If the attacker has deleted the installed copy of the Microsoft Office application from your laptop.
Computers and Technology
1 answer:
just olya [345]3 years ago
6 0

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

You might be interested in
5. How do vector graphics used with CRT technology work? List at least one of vector graphics’ advantages over raster graphics,
alekssr [168]
<span>Please see that Raster graphics are made up of pixels whereas Vector graphics are composed of paths, therefore the advantage of vector graphics is useful for creating images made up of line based components, such as Texts, polygons etc. Asteroids was a vector graphics based classic game.</span>
7 0
3 years ago
Sample answers of What assets were targeted Stuxnet and the team behind the worm?
Damm [24]
The assets were programmable logic controllers (PLCs).  Which controlled systems like prison doors and centrifuges for separating nuclear material. 

The "who" is still debated.  Credit (if you use that word) is given to the Equation Group.  But that is still hotly debated as there seems to be a political agenda with the attack and many still believe this was nation-state sponsored.  I can be easy to leave digital fingerprints behind to make it seem like a known hacking team.
8 0
4 years ago
When you call a ____________ method, it executes statements it contains and then returns a value back to the program statement t
Maksim231197 [3]

Answer:

The answer is a VOID method.

Explanation:

A void method is one that simply performs a task and then terminates.

4 0
4 years ago
Read 2 more answers
For BitTorrent, which of the following is true:
Bumek [7]

Answer:

d. All of the above

Explanation:

All the above mentioned statements are true about BitTorrent.

8 0
3 years ago
Which of the following is a popular open source intrusion detection system that runs on SmoothWall?? Synchronous Dynamic Random
SCORPION-xisa [38]

Answer: Snort

Explanation:Snort is a system which provides the service of the prevention of the intrusion. This system works as the open source for provision of the logging of packets and traffic analysis.

The functions in the snort are analysis of the protocol, content matching , searching etc. The main purpose of it is for the detection of the attack like stealth port ,CGI attacks etc.Other options are incorrect because they don't provides attack detection service.Thus the correct option is snort.

3 0
3 years ago
Other questions:
  • Which of the following protocols is used to unsure secure transmissions on port 443?A. HTTPSB. TelnetC. SFTPD. SHTTP
    6·1 answer
  • A dedicated website was created where fans could post photos of the pages from decoded that they found. in the communication pro
    11·2 answers
  • Which of the following is NOT a name of one of the central features of Facebook? Timeline Activity Log Graph Search Daily News
    11·1 answer
  • Which memory device is most appropriate for backing up a computer’s hard drive?
    11·2 answers
  • What do you think is the biggest threat to the security of your personal information?
    5·2 answers
  • What is one advantage of top-down programming design?
    8·1 answer
  • Sam plans to use this image in artwork for a brochure about airplanes. Which principles of page layout is Sam planning to use in
    11·1 answer
  • What method do phishing and spoofing scammers use
    12·1 answer
  • Which of the following is a capital resource a computer programmer
    15·1 answer
  • The choice of database does not have any impact on the relevancy of search results?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!