Dimensions of security may often conflict

Assignment Help Basic Computer Science
Reference no: EM133066636

Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session. These three dimensions of security may often conflict. Confidentiality and integrity often limit availability. So, a system should provide only what is truly needed. This means that a security expert has to carefully analyze what is more important among these three dimensions of security in a system or application.

Provide an example (and justification) where the confidentiality of a system is more important than the integrity or availability of that system. Then provide an example where the integrity of a system is more important than the confidentiality or availability of that system. Finally, provide an example of a system where the availability of a system is more important than the confidentiality or integrity of that system. For example, you might say availability is more important than integrity and confidentiality in a cell telephone system since one must be able to reach their loved ones in an emergency. Someone else might argue confidentiality/privacy is more important in such a system.

Reference no: EM133066636

Questions Cloud

Types of information systems and innovative methods : Distinguish between the main types of information systems and innovative methods of reducing costs and improving service through management information systems.
Acceptable use policy : Describe the purpose of an acceptable use policy you have selected and explain how the AUP helps provide confidentiality, integrity,
Importance of managerial accounting : Discuss the importance of managerial accounting as "decision-making tool" in your organization.
How did human nature factor into the breach : Describe the breach, including the type of attack and its ramifications. How did human nature factor into the breach?
Dimensions of security may often conflict : Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session. These three dimensions of security may often conflict.
Qatar airways seat selection : Qatar Airways seat selection offers you the most agreeable flight insight on voyaging Economy Class flights.
Security-forensics or information systems : The topic of your project must be related to the domain of Information Technology, in the area of: Security, Forensics, or Information Systems
C jump statements : Provide a detailed explanation and use of JUMP statements in C#. what are they used for, what are the different types of JUMP statements?
Spyware-adware and ransomware : Discuss the different types of malware that are designed to collect important data: spyware, adware, and ransomware. Provide an example for one of them.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Assess an organisation information system

Journal task is to assess an Organisation Information System, and write a report. The assessment should focus on the various components of business systems

  Write the code segment needed to set the data variable

Write the code segment needed to set the data variable to 25, and the tag string to "Hello World".

  System for rapidly developing software

Extreme Programming is a system for rapidly developing software. One of the tenets of XP is that all code is written

  Experience intermittent failures

"As our users' PC sage, we are seeing indications that some of the RAM modules are beginning to experience intermittent failures.

  Describe the steps that you would use in order to convert

We are ask to write in our own words. Describe the steps that you would use in order to convert database tables to the first normal form, second normal form

  Typical application structure in windows azure

What type of communication is used to exchange data between application components and why? (Cloud computing)

  Mechanisms in protecting against spam activity

Security techniques and mechanisms in protecting against spam activity

  What does sql stand for in computer

What does SQL stand for in computer?

  Explain how the events described may have resulted

Using the tools of consumer and producer surplus, explain how the events described may have resulted from price supports for sugar.

  Write a deletion method for avltree class

There are several techniques you can use, but a simple one is to simply add a Boolean field to the Node class that signifies whether or not the node is marked for deletion. Your other methods must then take this field into account.

  Conduct multidimensional queries

1. How can visual analytics are used to improve decision making? 2. Describe how OLAP enables a user to conduct multidimensional queries.

  K-means clustering algorithm to cluster multi class data set

Discuss the strengths and weaknesses of using K-Means clustering algorithm to cluster multi class data sets.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd