Describe the confidentiality-integrity and availability

Assignment Help Management Information Sys
Reference no: EM131401675

Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session. These three dimensions of security may often conflict. Confidentiality and integrity often limit availability. So, a system should provide only what is truly needed. This means that a security expert has to carefully analyze what is more important among these three dimensions of security in a system or application.

Please provide an example (and justification) where the confidentiality of a system is more important than the integrity or availability of that system. Then provide an example where the integrity of a system is more important than the confidentiality or availability of that system.

Finally, provide an example of a system where the availability of a system is more important than the confidentiality or integrity of that system. For example, you might say availability is more important than integrity and confidentiality in a cell telephone system since one must be able to reach their loved ones in an emergency. Someone else might argue confidentiality/privacy is more important in such a system.

Reference no: EM131401675

Questions Cloud

What is the maximum the firm should pay the worker : A competitive firm gets $3 per widget. A worker's average product is 4 and marginal product is 3. What is the maximum the firm should pay the worker?
Create an xslt stylesheet for your xml resume : Create an XSLT stylesheet for your XML resume that uses a client-side transform to display your resume using an HTML table. You should use the resume validated by the XMLSchema for practice with namespaces.
Describe how exactly the technology works : SCI 115- Describe the technology. Discuss what it accomplishes. Elaborate on the scientific principles that make this technology possible. Describe how exactly the technology works. Discuss the biological principles that underlie this technology.
How many workers would the firm hire : If the market wage were $7 an hour, how many workers would the firm hire?
Describe the confidentiality-integrity and availability : Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session. These three dimensions of security may often conflict. Confidentiality and integrity often limit availability. So, a system should provide on..
Calculate the terminal value : After five years the growth rate is project to be 4.9% per year. Free cash flow in year 5 is expected to be $137 million. Pulang is expected to be sold at its terminal value. Calculate the terminal value.
Current international finance related issue : You are required to do a short 10-minute presentation on any current international finance related issue. You are free to choose any current international-finance related issue or news based on your own interest. Besides the Internet, some other g..
What is the advantage of prizes over patents : One of the things that is slowing the development of nanotechnology is the legal morass of patents that anyone working with new ideas must deal with.
Why scientist choose to use rrna as evolutionary chronometer : SCI115- In your own words explain the concept of rRNA then suggest three reasons why scientists choose to use rRNA as an Evolutionary Chronometer.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd