a. Define the CIA security model components using your own words?
b. Provide an example in which each of the components are violated?
c. Who is responsible for CIA provide a scenario explaining his role?
CIA is a guideline for information security. Confidentiality refers to the set of rule that limits the access to information. Integrity is assuring that the information is trustworthy and accurate. Availability is the guarantee of access to the authorized people.
Confidentiality: Confidentiality is assuring that the information reaches the right people and preventing its access from the unauthorized people.
For the given scenario confidentiality is preventing the access of data from the unintended user. This is achieved by granting access to the various users at different levels. Only the legitimate user can view or update database.
Integrity: Integrity includes maintaining the consistency, accuracy and trustworthiness of data. In transit data must not be changed. This is achieved by user access control. All the transaction in the database must be atomic and complete. There should not be any partial update of data.
E.g. For the given scenario if there is any change in the bikeBreakType attribute of table ServiceProduct for the user ‘xyz’, relevant update must also be done in bikeBreakType attribute of UserDemo table.
Availability: Availability is making the data available to its users. It includes maintaining all hardware, proper functioning of DBMS server, upgrading the system etc. The idea is the system must not go down, it should always be available for the end user. Proper Disaster recovery plan should be adopted.
a. Define the CIA security model components using your own words? b. Provide an example in...
In your own words define symbolic interaction and provide an example.
Define System-1 and System-2 thinking in your own words. Give an example from your personal or work life where you would use each of them, explaining why each is appropriate to the situation in which you use it. Heuristics Define "heuristic" in your own words. Give an example of a heuristic might be used in your personal or professional life and briefly show how it could have a positive or negative effect. Do not use examples found in the text....
Q1)In your own words, define and briefly explain Data Communications. Also, name the five main components of Data Communications. Q2)In your own words, write a short note about the TCP/IP PROTOCOL SUITE and what is the difference between TCP/IP and OSI Model? Q3)Noise is one of the causes of transmission impairment. Different types of noise can affect the transmission of the signals. Briefly List and define TWO of those types in your own words. Q4)Using your own words, explain the...
Define (in your own words) business model. what is a business model? Gives Examples 2. Define (in your own words) business model. What is a business model? Give examples. • Remove this instructional/explanatory text before submitting assignment. • Use this slide (or create 1-4 additional slides) to define business model – what is it? Make sure you provide examples. This is NOT a data dump, so do NOT fill these slides with an overload of data. Your job is to...
Answer the following questions: (i) In your own words, define "earnings management" (ii) Provide two example of a behavioural incentive for earnings management (iii) Provide two example of a market-based incentive for earnings management
How would you define empathy in your own words? Share an example and discuss a time you displayed empathy. In what ways would your example be similar or different in your role as a medical administrative assistant?
in your own words define nursing in way of doing and give an example
in your own words, define nursing in way of thinking and give an example
in your own words, define nursing way of knowing and give an example
How would you define empathy in your own words? Share an example and discuss a time you displayed empathy. In what ways would your example be similar or different in your role as a medical administrative assistant?