Describe the confidentiality-integrity and availability

Assignment Help Management Information Sys
Reference no: EM131401675

Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session. These three dimensions of security may often conflict. Confidentiality and integrity often limit availability. So, a system should provide only what is truly needed. This means that a security expert has to carefully analyze what is more important among these three dimensions of security in a system or application.

Please provide an example (and justification) where the confidentiality of a system is more important than the integrity or availability of that system. Then provide an example where the integrity of a system is more important than the confidentiality or availability of that system.

Finally, provide an example of a system where the availability of a system is more important than the confidentiality or integrity of that system. For example, you might say availability is more important than integrity and confidentiality in a cell telephone system since one must be able to reach their loved ones in an emergency. Someone else might argue confidentiality/privacy is more important in such a system.

Reference no: EM131401675

Questions Cloud

What is the maximum the firm should pay the worker : A competitive firm gets $3 per widget. A worker's average product is 4 and marginal product is 3. What is the maximum the firm should pay the worker?
Create an xslt stylesheet for your xml resume : Create an XSLT stylesheet for your XML resume that uses a client-side transform to display your resume using an HTML table. You should use the resume validated by the XMLSchema for practice with namespaces.
Describe how exactly the technology works : SCI 115- Describe the technology. Discuss what it accomplishes. Elaborate on the scientific principles that make this technology possible. Describe how exactly the technology works. Discuss the biological principles that underlie this technology.
How many workers would the firm hire : If the market wage were $7 an hour, how many workers would the firm hire?
Describe the confidentiality-integrity and availability : Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session. These three dimensions of security may often conflict. Confidentiality and integrity often limit availability. So, a system should provide on..
Calculate the terminal value : After five years the growth rate is project to be 4.9% per year. Free cash flow in year 5 is expected to be $137 million. Pulang is expected to be sold at its terminal value. Calculate the terminal value.
Current international finance related issue : You are required to do a short 10-minute presentation on any current international finance related issue. You are free to choose any current international-finance related issue or news based on your own interest. Besides the Internet, some other g..
What is the advantage of prizes over patents : One of the things that is slowing the development of nanotechnology is the legal morass of patents that anyone working with new ideas must deal with.
Why scientist choose to use rrna as evolutionary chronometer : SCI115- In your own words explain the concept of rRNA then suggest three reasons why scientists choose to use rRNA as an Evolutionary Chronometer.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Write the security architecture section of network security

Once the risks in an organization have been identified, you must devise a plan that will provide the best possible protection without significantly impacting daily operations.For this assignment you will write the Security Architecture section of t..

  How verify method can be used to plan out system effectively

Evaluate which method would be efficient for planning proactive concurrency control methods and lock granularities. Assess how your selected method can be used to minimize the database security risks that may occur within a multiuser environment.

  How use of digital media was used to communicate information

In this assignment, you will locate examples of how the use of digital media was used to communicate information to achieve a specific goal of an organization or individual.

  Explain one of the cryptography standard

Below is the assignment asked, and I am unsure how to start the process: Imagine that you are explaining encryption standards to a nontechnical audience. Use one of the following to help explain one of the cryptography standards:

  Creation of a supply chainwhat effect does materials

creation of a supply chain?what effect does materials management have on the creation of a supply chain? what role

  Implement an approach to convert project requirements

Develop and implement an approach to convert project requirements into a project plan that meets cost, schedule and performance requirements.

  Does it matter what data is stored on your disk drive

Suppose you lose your company laptop at an airport. What should you do? Does it matter what data is stored on your disk drive

  Define an information system and types of information system

Define an information system and types of information systems

  Development of an er diagram

Development of an ER Diagram and Database Implementation Weight 20%, Aim: To give you practical experience in using Entity-Relationship and Relational Database modelling techniques

  Explian about vendor managed inventory system

What are the pros and cons of a vendor managed inventory system and How does it differ from a facility managed system

  What are the business challenges of the organization

What are the business challenges of the organization and what are the responses to these business challenges with regards to management.

  Analyze the fundamental impact of it architecture

Analyze the fundamental impact of IT architecture or enterprise architecture on information management for your chosen company or industry. Determine if IT architecture impacts the effectiveness or efficiency of information management and vice ver..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd