Question

In: Computer Science

Provide a scenario that illustrates an example of: A breach to confidentiality A breach to integrity...

  • Provide a scenario that illustrates an example of:

    1. A breach to confidentiality

    2. A breach to integrity

    3. A breach to availability

Solutions

Expert Solution

CIA ( Confidentiality, Integrity, and availability) are the three pillars for the Information security of an organization. Confidentiality ensures that the information to be accessible and used by only the authorized person, Integrity ensures that information or data is authentic and trustworthy and Availability ensures information is available every time whenever it is needed.

Breach to confidentiality

Whenever there is a loss of privacy, there is a breach of confidentiality. For example, sales leads of an organization are leaked to other companies. In this scenario, the sales leads are highly confidential but they are leaked. So, we can say there is a confidentiality breach.

Breach to Integrity

Whenever an unauthorized person changes the information and making it not trustworthy, there is a breach of confidentiality. For example, an authorized person has changed the sales lead's contact detail. So, we can say the Integrity exams are breached.

Breach to availability

Whenever an unauthorized person vanishes the information and making it not available for the authorized person is termed as a breach of availability. For example, an unauthorized person has destroyed the sales leads and making it not available. So, we can say the availability of exams is breached.


Related Solutions

CIA Confidentiality - The avoidance of the unauthorized disclosure of information Integrity - The property that...
CIA Confidentiality - The avoidance of the unauthorized disclosure of information Integrity - The property that information has not be altered in an unauthorized way Availability - The property that information is accessible and modifiable in a timely fashion by those authorized to do so AAA Assurance - How trust is provided and managed in computer systems Authenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine. Anonymity - The property that...
One of the security threats is confidentiality breach. Explain what it is, how it can be...
One of the security threats is confidentiality breach. Explain what it is, how it can be detected and how it can be prevented.
For each of the following terms, provide a brief classroom example that illustrates the term.: a....
For each of the following terms, provide a brief classroom example that illustrates the term.: a. Positive reinforcer b. Primary reinforcer c. Secondary reinforcer e. Negative reinforcement f. A variable reinforcement schedule g. An interval schedule of reinforcement Please answer with a minimum of 3 paragraphs.
Provide an example that best illustrates either an in common or conflicting view of compensation in...
Provide an example that best illustrates either an in common or conflicting view of compensation in relation to one or more of the other groups, employees, society?
Please describe how you understand confidentiality and privacy to differ. Is it ever ok to breach...
Please describe how you understand confidentiality and privacy to differ. Is it ever ok to breach patient confidentiality? If so, how and when. Is it ever ok to breach patient privacy? If so, how and when? 2. Case study: The patient is a 54 year old woman. She has been experiencing fatigue, dizziness, pallor and excessive vaginal bleeding for several months. Upon a visit to her physician, it has been discovered that the patient is symptomatically anemic and does not...
Application of Auditing Principles 1 - Integrity, Independence and Objectivity 2 - Confidentiality 3 - Skill...
Application of Auditing Principles 1 - Integrity, Independence and Objectivity 2 - Confidentiality 3 - Skill & Competence 4 - Work Performed by Others 5 - Documentation 6 - Planning 7 - Audit Evidence 8 - Accounting Systems and Internal Controls 9 - Audit Conclusions and Reporting Explain one (1) way you anticipate using what you have learned from this course in your current or future career. Provide one (1) specific example to support your response. Also, what content do...
How do the four principles of the Code of Ethics (Integrity, Objectivity, Confidentiality, and Competency) influence...
How do the four principles of the Code of Ethics (Integrity, Objectivity, Confidentiality, and Competency) influence the auditing standards?   Why are each of these important?   Are these principles sufficient?
What are the three main goals of the CIA (Confidentiality-Integrity-Availability) Security Triad and what are the...
What are the three main goals of the CIA (Confidentiality-Integrity-Availability) Security Triad and what are the most common gaps you see exploited today? What is the relevance of CIA Triad in the globalized networked environments today?
Provide an example that illustrates Helman’s (2007) assertion that modern medicine also constitutes “a system of...
Provide an example that illustrates Helman’s (2007) assertion that modern medicine also constitutes “a system of morality”?
1-Explain professional ethics in the accounting field. Be sure to include and explain competence, confidentiality, integrity...
1-Explain professional ethics in the accounting field. Be sure to include and explain competence, confidentiality, integrity and credibility. 2-Explain cost vs. benefits as it relates to accumulating, analyzing and providing accounting information 3- Describe the main differences between traditional accounting systems and Activity Based Cost Accounting systems. Which system is generally considered better and why?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT