Question

A. The key security concepts involve the Confidentiality, Integrity, and Availability? Explain the differences among them...

A. The key security concepts involve the Confidentiality, Integrity, and Availability? Explain the differences among them and mention one practical example to each one? Are there any other concepts to involve to make the security concepts more rigorous? Explain how?

B. List the five most Computer Security Challenges?

C. Explain the difference between vulnerabilities, threats and attacks?

Homework Answers

Answer #1

Answer of question A.

The key concept that confidenability,integrity and availability is called as CIA triad the main goal is needed to achieve information security

1.confidentiality

This is the protection of information from unauthorized access.this emphasizes the need of information protection.confidenability requires measure to ensure that the only authorized people are allowed to access the information.for example when the information is record of people personal activities like in case involving personal and financial information of the any customer of companies like google, amezon and like other big companies.and to guarentee confidiability under this need to controlled to prevent unauthorized access

2.integrity -the main goal of integrity where information is kept accurate and consistent unless authorized changes are made.the integrity maintained when the information remains unchanged during storage.for example banks are more concerned about the integrity of financial record.with confidiability having only second priority. Some depositer leves atm receipt unchecked and hanging around while withdrawing cash.this show confidiability does not highest priority instated the goal of integrity is information security in banking systems..

Availability-goal of availability is the situation where information is available when and where is rightly needed.it maintained when all component of the information.for system working properly.the problem contain that it impossible to access information so availability is linked to information security because to protect system components and to ensure the data is available.for example government generated online press release are involved.press generally for public cons8.the information should available for public.so confidiability is not of concern integrity is second priority to guarentee availability of information in press release govt ensure there website have minimal.backup are also used to ensure ability of public information.from the example you will get clear the diference.

Answer of b.

1.advanced thread

those thread that go the way around to pentatr system and server that stays for longer time without getting noticed by anybody.they are designed for specially for highly sensitive information fails to protect themselves from advanced thread attack.

2.Evaluation of ransomware

This type can be also get classified as one type of apt attack.where the malware can penetrates inside the system and it start to encrypt all your files slowly.for example in case of bitcoin because when all files on system get locked and it hard to track once payment is made a decryption key is provided by hacker,using all the data can decrypted back.where hacker can contain very bad mindset they take all demanded money.

3.serverless app

Serverless app is an application which depend on third party cloud and you can say also backend services such as Google cloud information or lambada.this app invites cyber attackers to spread threats on system easily because this application locally or off server on there devices.they are do nathing to keep the attackers away from data.this application doesn't help if an attacker gains access to data.

4.lot thread

It contain the internet of things.in this system irritates physical devices which can be accessible through internet. This connect physical devices containing the unique identifier and ability to transfer data over without any network .they were designed it it not considered in mind about in cyber security's .so every organization needs to work in cybersecurity professionals to ensure of there password policies and user verification.

5.AI expansion

It is area of computer science which is the creation of intelligence machine that to do work like human.some of activites are related to ai include speech recognition,learnings planning.the key benefit with ai is ability to protect and defend and environment when malicious attack begin.ai takes immediate action against the malicious attackers when thread impact on business.

Answer of questions c.


Vulnerability, thread and attacks are terms that are related to cyber security. But organizations get there meaning confused.
Thread-thread is a like organization it defending itself against.that has potential to cause damage where attack os attempted to cause damage.thread to the information system doesn't mean information damaged .

Valuability-this intentionally attacks on on computing resources and network persist for a number of reason.it could be weakness in the technology or in security policy.it must be addressed to migrate any thread that could advantage of valuability.

Attacks-an attack contain a action that exploits a valuability or enacts thread.for example attack include sending malicious input to an application.the attack can be contain intentionally.attacks on the information that might tobe damage.a security attack takes action against a target with intention that doing harm

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
In narrative essay format, I want you to address a business/organization case study using multiple concepts...
In narrative essay format, I want you to address a business/organization case study using multiple concepts from class. The case question and case text begin on page 5 of this document. You need to demonstrate their best understanding of management and organizational behavior theory, and the application of those ideas to improve the understanding of various issues. You need to clearly identify at least 3 distinct, substantive issues. For each issue you need to 1), identify evidence from the case...
I just need the following questions answers Quantitative Research Designs 101 1. Quantitative research attempts to...
I just need the following questions answers Quantitative Research Designs 101 1. Quantitative research attempts to do which of the following? a. Identify, define and measure factors that contribute to a disorder or disease. b. Examine relationships among factors. c. Evaluate the cost-effectiveness of an intervention. d. All of the above 2. Qualitative and quantitative research designs are appropriate to answer different types of public health questions. Which of the following is NOT an objective of qualitative research? a. To...
What are 4 key things you learned about the topic from reading their paper? How does...
What are 4 key things you learned about the topic from reading their paper? How does the topic relate to you and your current or past job? Critique the paper in terms of the organization and quality. Team 3 answer questions above. Part I In today’s world we see fear among people when dealing with sexual harassment. This leads to people not reporting sexual harassment. A misconception about sexual harassment is that it’s only about touching and forcing other people...
Which one of the following psychologists is most likely to agree with the idea that there...
Which one of the following psychologists is most likely to agree with the idea that there are "multiple intelligences" that are independent and distinct? A) Charles Spearman B) Claude Steele C) Howard Gardner D) Sue Savage-Rumbaugh Kyle is studying how language abilities change throughout childhood, and Kelly is studying cognitive changes in late adulthood. Both Kyle and Kelly are conducting studies in which area of psychology? A) clinical psychology B) humanistic psychology C) epigenetics D) developmental psychology REM sleep is...
provide 3-4 paragraphs post (team 2) 1-What are 4 key things you learned about the topic...
provide 3-4 paragraphs post (team 2) 1-What are 4 key things you learned about the topic from reading their paper? 2-How does the topic relate to you and your current or past job? 3-Critique the paper in terms of the organization and quality.1- Employee Stress and how it has an Adverse Effect on a Company This paper explores employee stress and how it has an adverse effect on a company, its employees and the organization. Job stress can have a...
1.Establishing the virtual Management: As known, managing virtual staff requires a different method or approach than...
1.Establishing the virtual Management: As known, managing virtual staff requires a different method or approach than managing local staff. Due to that reason, Golden Scent has developed a strategic plan to successfully manage its virtual staff in the USA. Identify the suitable manager. to make sure our work will proceed as we planned, Golden Scent willrecruit a virtual manager with the essential skills and knowledge required to manage virtual employees. Find the skilled people to work with. Since not everyone...
Please read the article and answear about questions. Determining the Value of the Business After you...
Please read the article and answear about questions. Determining the Value of the Business After you have completed a thorough and exacting investigation, you need to analyze all the infor- mation you have gathered. This is the time to consult with your business, financial, and legal advis- ers to arrive at an estimate of the value of the business. Outside advisers are impartial and are more likely to see the bad things about the business than are you. You should...
Please answer this question in short essay form (2-4 paragraphs) Considering that cultures as complicated and...
Please answer this question in short essay form (2-4 paragraphs) Considering that cultures as complicated and socially constructed through the communicative interaction of organizational members. Briefly describe how the organizational concepts of complicated, emergent, unitary, and ambiguous apply to the sample auto-ethnography. Sample Auto-ethnography: Required Reading Auto-ethnography of College X Joe Student Organizational Culture and Diversity 223-58000 “The organization’s culture has both a direct and an indirect impact on the allocation of power among diverse groups. The values and ideologies...
The assignment summary sheets will be submitted week 14 with Test 3. You are to personally...
The assignment summary sheets will be submitted week 14 with Test 3. You are to personally experience the power and satisfaction of developing these skills firsthand and to reflect and write about this experience. Over the years, many students have shared amazingly rewarding experiences as they worked on these skills. The assignment will be evaluated and be weighted as 5% of your final mark (together, they are worth 20% of your mark for Test 3, which is worth 25% of...
The Business Case for Agility “The battle is not always to the strongest, nor the race...
The Business Case for Agility “The battle is not always to the strongest, nor the race to the swiftest, but that’s the way to bet ’em!”  —C. Morgan Cofer In This Chapter This chapter discusses the business case for Agility, presenting six benefits for teams and the enterprise. It also describes a financial model that shows why incremental development works. Takeaways Agility is not just about the team. There are product-management, project-management, and technical issues beyond the team’s control. Lean-Agile provides...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT