Question

The triad, popularly known as CIA is universal, as you pointed out, for the security of...

The triad, popularly known as CIA is universal, as you pointed out, for the security of any enterprise. Out of Confidentiality, Integrity and Availability, - is there one that is more important than the others? Your thoughts?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Confidentiality makes sure that information is securely accessed.

Integrity makes sure that information is true and trustworthy.

Availability makes sure that access is reliable and uninterrupted.

Availability is most important as if access is hampered, the other two can not be assured. Denial of Service attacks are most common to affect this feature. Physical attacks like disasters can also affect availability. Therefore, backup and and post accident recovery measures are applied.

Add a comment
Know the answer?
Add Answer to:
The triad, popularly known as CIA is universal, as you pointed out, for the security of...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • HOMEWORK 1: CS 386 (Cryptography) Due Date: January 25, 2018 1. Write short answers for each...

    HOMEWORK 1: CS 386 (Cryptography) Due Date: January 25, 2018 1. Write short answers for each one of them a) Method of concealing data including messages, files, keys and passwords is known as: b) Method to protect blocks of data from being altered is known as c) What are three parts of CIA triad? d) What is the main difference between accountability and availability e) What is the ITU-T recommended security architecture for OSI called? 2. Explain the differences between...

  • Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control...

    Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control assessor Information System Owner (ISO) Information Owner/Steward When making determinations regarding the adequacy of common controls for their respective systems, Information System Owner (ISO) refer to the Common Control Providers’ (CCP) Privacy Impact Assessment (PIA) Business Impact Analysis (BIA) Authorization Packages Vulnerability Scans An organization-wide approach to identifying common controls early in the Risk Management Framework (RMF) process does which of the following? Considers...

  • 1. Research Security Information and Event Management (SIEM) What is Security Information and Event Management (SIEM)?...

    1. Research Security Information and Event Management (SIEM) What is Security Information and Event Management (SIEM)? (Do Internet research). How do you think SIEM compares to Intrusion Detection/Prevention systems (IDS/IDPS) as described in our textbook? Similarities/differences? Identify an SIEM product, read about it on the vendor’s website, and identify two (2) websites that provide reviews of this product. Would you recommend your identified SIEM product to an enterprise/large organization? Why or why not? Write a brief report of your findings...

  • Cyber Security Question: A University is considering placing a smart television in each dorm room. One...

    Cyber Security Question: A University is considering placing a smart television in each dorm room. One exciting feature for this new television is that it uses voice control, with no control buttons on the television (other than an on/off button to turn the screen on and off). There is no remote control (so that you cannot lose it). The smart television is also connected to the campus Ethernet network. The television computer is always “on” to listen to the voices...

  • There are a lot of different technologies out there and deciding which is right for your...

    There are a lot of different technologies out there and deciding which is right for your organization can take a lot of research. One of the most basic pieces of technology out there is a firewall. Modern "Next-Generation" enterprise-grade firewalls integrate many of the technologies discussed in this week's reading providing functionality ranging from basic stateful firewall capabilities, to intrusion detection/prevention, VPNs, and more. Using the web, journals, library, or other resources, identify three well-known manufacturers of enterprise firewalls. Review...

  • I would like to you spend a few moments and access Internet Security, Privacy, and Legal...

    I would like to you spend a few moments and access Internet Security, Privacy, and Legal Issues under this week's activities. This module discusses many of the important things we need to take into consideration regarding online security and protecting ourselves against common threats including viruses, spyware and malicious identity theft tactics. As a web designer, it is important to understand the threats against our web sites or online web applications. Such attacks as SQL injections and Denial of Service...

  • I. Nylon 6-6 is a condensation polymer. The last two lab handouts pointed out that "condensation...

    I. Nylon 6-6 is a condensation polymer. The last two lab handouts pointed out that "condensation reactions are extremely common among a variety of organic functional groups." Pick two appropriate functional groups (your choice) and draw structures to show the condensation reaction between them. Identify the functional groups that are reacting, as well as the linkage formed by the condensation. 2. Rather than use a carboxylic acid for the nylon condensation, you'll use the more reactive acid chloride. This must...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • Cryptography is one of the most fundamental aspects of cyber-security. As we've seen, encryption and hashing...

    Cryptography is one of the most fundamental aspects of cyber-security. As we've seen, encryption and hashing are pervasive throughout computing. There are techniques such as SSL used to encrypt "data in transit" (data which is actively being sent over the network) and there are technologies that can be employed on your end devices to encrypt "data at rest" (data which is stored on a device or server). Recently, there has been some controversy over encryption. Once available primarily to the...

  • Can you please write it down 300 or more words . I appreciate your help . nt LoraryBooksResourcesmailFacuity lexandr...

    Can you please write it down 300 or more words . I appreciate your help . nt LoraryBooksResourcesmailFacuity lexandria School of Arts and Sciences 2018 OSTERM > Session C> 2018 OSTERM y Discussion Board hics rsity Discussion Time Now it is your turn. Martha needs help resolving her dilemma. How can you help? Martha wants to help the diverse group of people who have been displaced due to Katrina However, the line of people coming for help along with all...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT