Question

In: Computer Science

Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...

Please, i need Unique answer, Use your own words (don't copy and paste).

*Please, don't use handwriting.

Complete the following table related to the CIA triad.

Confidentiality Integrity Availability

Definition

Example of business situation leading to a loss of
Example of threat to

Solutions

Expert Solution

The business situation leading to a loss of:

a) Confidentiality: A confidential document left unattended at the common office printer, probably that might have sent for print by a higher officer.

b) Integrity: A sensitive document being updated without following the proper processes and policies.

c) Availability: Ignoring the software system updates & postponing the hardware issue fixations.  

Example of threat to:

a) Confidentiality: A confidential document being sent to print in the unprotected mode in the common office printer even when the printer has the option of protected mode that requires user login to the printer before printing the document.

b) Integrity: Unavailability of the version control system for the important documents. This can hamper the retrieval of the original document in case of accidental modifications/deletions.  

c) Availability: Not keeping the redundant data servers. If we have redundant servers available, we can handle the unavailability of data caused by any hardware/software/network issues at the main server  


Related Solutions

Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting. *Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting.*Please, don't use handwriting. _______________ Solve the following questions Q1 Construct a cumulative frequency distribution of the 20 brain volumes(cm3) listed below. Use the classes 900-999, 1000-1099,...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting. *Please, don't use handwriting.* *Please, don't use handwriting. *Please, don't use handwriting.**Please, don't use handwriting. *Please, don't use handwriting.**Please, don't use handwriting. *Please, don't use handwriting.* * i need References URL Link pleasssse help me i need the answer Critically appraise the following cross-sectional study given in the link below: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5989365/ Discuss the strength and limitations of the study in a brief manner...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use handwriting, Use your keyboard. Q. 2. In present scenario, the importance of microeconomics is increasing day by day, in your          Opinion, what are the three ways that we can use macroeconomic analysis.
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use handwriting, Use your keyboard. Q. 3. When the whole sector of the market is occupied by the little number of big corporations who share the leadership, what do we call this type of market structure? Explain in details the benefits for the leading company and disadvantage of such situation on final consumers.
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting. Suppose you are assigned a task of designing user interface for a web application to get students' feedback about sports facilities provided at the campus. The application is composed of data entry forms with menus and dialog boxes. Having, as goals, speeding up students’ data entry and reducing errors, please tell which six major menu design concerns you will keep in mind during...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use handwriting, Use your keyboard. Q1. Discuss in your words the purpose of a bank reconciliation. (1 point) Q2. Prepare general journal entries for the following transactions of this company for the current year: (2 points). Apr. 25 Sold SAR 4,500 of merchandise to CBC Corp., receiving a 10%, 60-day, SAR 4,500 note receivable. June 24 The note of CBC Corp., received on April 25...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use handwriting, Use your keyboard.    Q3. Choose two accounting assumptions and explain in your word.   
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). Please, don't use handwriting, Use your keyboard. Q. 1. Provide an example of any two leading companies from the same industry, which are competing directly for market share. Give a short profile. Q. 2. Suppose, if you are the manager of one of these companies, what pricing policy will you adopt to be in the first position? Why? Q. 3. When the whole sector of the market...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting. Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting. Q1: Assume that there is a class named TestInterface that implements two interfaces A and B. Both the interfaces have a common method with the same signature (example int sampleMethod()). Explain how will the class define this method and how will the compiler identify, to which...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use...
Please, i need Unique answer, Use your own words (don't copy and paste). *Please, don't use handwriting. DDoS attack Based on the Internet, access to the article intituled: ‘A survey on DDoS attack and defense strategies from traditional schemas to current techniques’. 1- Describe the DDoS attack. 2- Provide at least two exploited vulnerabilities used by hacker to perform the DDoS attack. 3- Provide at least two countermeasures against DDoS.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT