Question

In: Computer Science

With respect to the C.I.A. and A.A.A. concepts, what risks are posed by someone making so many download requests from an online music store that it prevents other users from being able to download any songs?

CIA

Confidentiality - The avoidance of the unauthorized disclosure of information

Integrity - The property that information has not be altered in an unauthorized way

Availability - The property that information is accessible and modifiable in a timely fashion by those authorized to do so

AAA

Assurance - How trust is provided and managed in computer systems

Authenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.

Anonymity - The property that certain records or transactions not to be attributable to any individual

With respect to the C.I.A. and A.A.A. concepts, what risks are posed by someone making so many download requests from an online music store that it prevents other users from being able to download any songs?

Solutions

Expert Solution

Availability property of CIA (Confidentiality - Integrity - Availability) Model states that information is accessible and modifiable in a timely fashion by those authorized to do so. In above scenario, when someone is making so many download requests from an online music store that it prevents other users from being able to download any songs makes the Availability of data to other users difficult because of occurrence of bottlenecks in Bandwidth or due to a DoS. Any Information has high value only if authorized users can access it at the right time when it is needed. The primary aim of DoS attacks is to deny users access to the data. Such downtime can be very costly to the users and to the Business also. Their must be an extra layer of security i.e equipment or software such as firewalls and proxy servers that can guard against such downtime and unreachable data due to malicious actions such as denial-of-service (DoS) attacks and network intrusions.


Related Solutions

With respect to the C.I.A. and A.A.A. concepts, what risks are posed by spam?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
With respect to the C.I.A. and A.A.A. concepts, what risks are posed by trojan horses?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
With respect to the C.I.A. and A.A.A. concepts, what risks are posed by computer viruses?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
With respect to the C.I.A. and A.A.A. concepts, what risks are posed by packet sniffers, which monitor all the packets that are transmitted in a wireless Internet access point?
CIAConfidentiality - The avoidance of the unauthorized disclosure of informationIntegrity - The property that information has not be altered in an unauthorized wayAvailability - The property that information is accessible and modifiable in a timely fashion by those authorized to do soAAAAssurance - How trust is provided and managed in computer systemsAuthenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.Anonymity - The property that certain records or transactions not to be...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT