Question

In: Computer Science

CIA Confidentiality - The avoidance of the unauthorized disclosure of information Integrity - The property that...

CIA

Confidentiality - The avoidance of the unauthorized disclosure of information

Integrity - The property that information has not be altered in an unauthorized way

Availability - The property that information is accessible and modifiable in a timely fashion by those authorized to do so

AAA

Assurance - How trust is provided and managed in computer systems

Authenticity - The ability to determine that statements, policies, and permissions issued by persons or systems are genuine.

Anonymity - The property that certain records or transactions not to be attributable to any individual

With respect to the C.I.A. and A.A.A. concepts, what risks are posed by trojan horses?

Solutions

Expert Solution

Torjan horse is the kind of malware which behaves as if it has some useful functionality for the user and in the background it does the malicious work such as:

  • Providing the attacker with backdoor entry
  • Destroying data without the user getting to know about it.

The following can be noticed about torjan horses in regards to CIA:

  1. Confidentiality: Torjan horse can provide backdoor entry to the attacker. This may endanger the confidential information stored on the system.
  2. Integrity: After the attacker has gained backdoor entry, they may alter the system's data without permission of the user. If permission is absolutely needed by the file system and operating system, then the torjan horse may ask the user for permission to do some normal task but maliciously use that permission for aiding the attacker.
  3. Availibility: Torjan horse being a malicious background process can pose itself as harmless and in camouflage of that, it may destroy information thereby destroying the ease of availibility.

----------------------------------------------

Now let's look at the dangers it poses towards AAA:

  1. Assurance: The torjan horse may not affect this part of the system in a passive way such as although it is guaranteed to the user of some resource, the attacker using the backdoor entry provided by the torjan horse may result in instability of the system and thereby, jeopardizing the trust guaranteed to the users.
  2. Authenticity: It is the torjan horse's specialty to disguise itself as authentic when in the background it is not.
  3. Anonymity: The anonymity is compromised because the torjan horse leaks information by providing a background passage into the system.

Related Solutions

What are the three main goals of the CIA (Confidentiality-Integrity-Availability) Security Triad and what are the...
What are the three main goals of the CIA (Confidentiality-Integrity-Availability) Security Triad and what are the most common gaps you see exploited today? What is the relevance of CIA Triad in the globalized networked environments today?
Review the three attributes you learned in Cybersecurity: Confidentiality, Integrity and Availability. Learn Information Assurance and...
Review the three attributes you learned in Cybersecurity: Confidentiality, Integrity and Availability. Learn Information Assurance and understand why two more attributes, Authentication and Nonrepudiation, should be involved in the Security Services dimension, and what the Time dimension for information security and assurance discusses. Write a short paper to discuss and describe your understanding.
Provide a scenario that illustrates an example of: A breach to confidentiality A breach to integrity...
Provide a scenario that illustrates an example of: A breach to confidentiality A breach to integrity A breach to availability
Explain the concept of a corporate integrity agreement (CIA) and the role a consultant might play...
Explain the concept of a corporate integrity agreement (CIA) and the role a consultant might play when such an agreement is in effect.I NEED DIFFERNT ANSWER OF THE ONE THE CHEGG PLEASE
Flag "Preventing the unauthorized disclosure and loss of data has become almost impossible. Employees and others...
Flag "Preventing the unauthorized disclosure and loss of data has become almost impossible. Employees and others can use iPods, flash drives, cameras, and PDAs such as iPhones to download data and remove it from an organization's premises." Do you agree or disagree with the statement above? Please provide support for your position. What controls from the chapter could be applied to reduce the risk of data disclosure and risk from these devices (please pick 3)? How would the controls you...
Application of Auditing Principles 1 - Integrity, Independence and Objectivity 2 - Confidentiality 3 - Skill...
Application of Auditing Principles 1 - Integrity, Independence and Objectivity 2 - Confidentiality 3 - Skill & Competence 4 - Work Performed by Others 5 - Documentation 6 - Planning 7 - Audit Evidence 8 - Accounting Systems and Internal Controls 9 - Audit Conclusions and Reporting Explain one (1) way you anticipate using what you have learned from this course in your current or future career. Provide one (1) specific example to support your response. Also, what content do...
How do the four principles of the Code of Ethics (Integrity, Objectivity, Confidentiality, and Competency) influence...
How do the four principles of the Code of Ethics (Integrity, Objectivity, Confidentiality, and Competency) influence the auditing standards?   Why are each of these important?   Are these principles sufficient?
Explain the legal and ethical considerations for the following: 1. Privacy, Confidentiality and Disclosure 2. Discrimination...
Explain the legal and ethical considerations for the following: 1. Privacy, Confidentiality and Disclosure 2. Discrimination 3. Duty of care – 4. Mandatory reporting 5. Translation services 6. Informed consent 7. Work Role Boundaries – responsibilities and limitations When there is an issue impacting on a person’s rights and responsibilities including employee’s, employers and clients how would you refer the issues and to whom? Please give an example for each. Employee’s Employers Clients When using organisational structures and/or different support...
Explain ethical considerations in relation to tax practitioners conflict of interest, confidentiality and disclosure requirements
Explain ethical considerations in relation to tax practitioners conflict of interest, confidentiality and disclosure requirements
1-Explain professional ethics in the accounting field. Be sure to include and explain competence, confidentiality, integrity...
1-Explain professional ethics in the accounting field. Be sure to include and explain competence, confidentiality, integrity and credibility. 2-Explain cost vs. benefits as it relates to accumulating, analyzing and providing accounting information 3- Describe the main differences between traditional accounting systems and Activity Based Cost Accounting systems. Which system is generally considered better and why?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT