Threats to confideliality,intergrity,and availabilty
BabesCreate a minimum 1-page table in Microsoft® Word or Word Compatible identifying a minimum of 6 threats, using the column headers and details below:
Column Headers
- Threat
- Threat to Type of Data
- Confidentiality/Integrity/Availability
- Mitigation Suggestion
Details Within Your Table
- Identify relevant threats. List 1 per column.
- Determine the type of data threatened (data-at-rest, data-in-transit, or processing) in the column.
- Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A in the column.
- Describe the mitigation plan in 2 to 3 sentences in the column.
Example Table
Include a short paragraph that highlights 2 access control techniques or policies that enforce security.
Cite at least 2 resources to support your assignment.
Format your assignment according to APA guidelines.
Review Rubric to assure all requirements are met.
- 2 years ago
- 5
Answer(1)
Purchase the answer to view it
- hreatsToConfidelialityIntergrityAndAvailabilty.edited.docx
other Questions(10)
- Week 6 Most Challenging Concepts (8 post)
- lady kate
- nothing
- Mack begins by designing the smallest fish tank. This tank is a rectangular prism with dimensions 4 feet by 2...
- In which area of your daily life do mass communication and other forms of communication overlap? How has mass communication become integral to the things you do? What is your preferred media channel for communication? Refer to 2 specific examples from you
- Discussion
- it's 3 pages about Q 20
- Information systems
- CJA 474 Week 4 DQ 2
- Geo Unit V