What is three dimensions of security in a system

Assignment Help Computer Network Security
Reference no: EM133409554

Assignment:

Confidentiality, integrity, and availability, or the CIA triad of security, is introduced in this session. These three dimensions of security may often conflict. Confidentiality and integrity often limit availability. So, a system should provide only what is truly needed. This means that a security expert has to carefully analyze what is more important among these three dimensions of security in a system or application.

Use this forum to provide three examples and justification:

  1. Where the confidentiality of a system is more important than the integrity or availability of that system.
  2. Where the integrity of a system is more important than the confidentiality or availability of that system.
  3. Where the availability of a system is more important than the confidentiality or integrity of that system.

For example, you might say availability is more important than integrity and confidentiality in a cell telephone system since one must be able to reach their loved ones in an emergency. Someone else might argue confidentiality/privacy is more important in such a system.

Reference no: EM133409554

Questions Cloud

Discuss what kind of knowledge is imparted in video : Discuss what kind of knowledge is imparted in video, why the training was effective and how learning is transferred.
Which component of ethical crisis management do you feel is : Which component of ethical crisis management do you feel is most important and why? Please explain your answer in the context of a recent, crisis
Explaining how discussing racial disparity in healthcare : Explaining how discussing racial disparity in healthcare is upholding the mission of the social work profession
How could jeff attitude toward social responsibility impact : How could Jeff's attitude toward social responsibility impact Perry's strategy? Justify your rationale with support from course materials.
What is three dimensions of security in a system : This means that a security expert has to carefully analyze what is more important among these three dimensions of security in a system or application.
Discuss how case contributed to foundations for future : Discuss how case contributed to foundations for future reproductive justice work. What were some of the contradictory circumstances under which
Describe one or two examples of incremental change from : What is incremental change? Describe one or two examples of incremental change from your current or former organization. Or, choose another organization that
How can social science methods helps us understand why : How can social science methods helps us understand why or how poverty has a negative impact on Indigneous peoples in Canada?
Describe what medical necessity is in your understanding : Describe what medical necessity is in your understanding. Propose at least one way to avoid having a medical necessity issue when the initial claim is sent.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Discuss the various cyber and cybersecurity roles

The focus on the 9/11 Commission and DHS when formed was primarily to protect physical infrastructure (and people) against terrorist attacks.

  Which risk register would you use to identify wannacry

Explain the definition of ransomware. Summarize the WannaCry threat. Which risk register would you use to identify WannaCry?

  How the conventional algorithm works

How the conventional algorithm works and Benefits that you gain from these changes - Analyse and apply knowledge and skills to investigate and protect against

  Assessment plan of the applications for network performance

Assessment plan of the applications for network performance - Students can demonstrate in a group of 2. Students should be ready with all setup

  COMP714 Advanced Network Technologies Question

COMP714 Advanced Network Technologies assignment help and solutions, Auckland University of Technology, assessment help - Develop a network model.

  Determine plaintext and key from affine cipher

Below are given of ciphertext, from Affine cipher. Determine the plaintext and key. Give a clearly written description of the steps you followed to decrypt each ciphertext.

  Describe how the mix of state and non-state actors

Describe how the mix of state and non-state actors you identified should affect policy maker decision-making and policy development for critical infrastructure protection.

  Summarize the working with emotional intelligence

Based on Daniel Goleman's book, Working with Emotional Intelligence, summarize your reaction. Including, what was interesting or caught your attention?

  Provide outline of overall configuration management system

Provide an outline of the overall configuration management system that is required to implement the security configuration of the network. Define the process for change management for security configuration of network devices and systems.

  Most difficult type of cyber attack to defend against

Consider how this information could be used by an organization for its security program. Was anything surprising to you - Post a message to the forum regarding your experience with any of the cyber attacks described in the text.

  Explain diffie-helman protocol for sending message

In Diffie-Helman protocol, the common modulus is selected as n = 19 and the generator g is chosen to be 2. Alice and Bob select numbers 6 and 10 privately.

  Explore the functionalities of iptables

Explore the functionalities of iptables, the Linux firewall and write some rules - Explore the functionalities of iptables, the Linux firewall

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd