Three dimensions of security may often conflict

Assignment Help Basic Computer Science
Reference no: EM132608509

Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session. These three dimensions of security may often conflict. Confidentiality and integrity often limit availability. So, a system should provide only what is truly needed. This means that a security expert has to carefully analyze what is more important among these three dimensions of security in a system or application.

Provide an example (and justification) where the confidentiality of a system is more important than the integrity or availability of that system. Then provide an example where the integrity of a system is more important than the confidentiality or availability of that system. Finally, provide an example of a system where the availability of a system is more important than the confidentiality or integrity of that system. For example, you might say availability is more important than integrity and confidentiality in a cell telephone system since one must be able to reach their loved ones in an emergency. Someone else might argue confidentiality/privacy is more important in such a system.

Reference no: EM132608509

Questions Cloud

What is the unit product cost for the year : Hayes Inc. provided the following information for the current year: Variable manufacturing overhead$35/unit. What is the unit product cost for the year
Project goals and project objectives : Describe at least three project goals and three project objectives. Describe a high-level timeline that includes key tasks and deadlines.
Relationship among ethics-morality-law-regulation and policy : Based upon the assigned readings, research and your life experience, discuss the relationship among ethics, morality, law, regulation and policy.
Journalize the two entries required to close the accounts : the end of the fiscal year, the following balances were taken from the ledger of Magenta Delivery services CO. Journalize two entries required to close accounts
Three dimensions of security may often conflict : Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session. These three dimensions of security may often conflict.
Software development models or methodologies : Choose one of the software development models or methodologies.Using the library or a credible source on the Internet, find an article which describes the model
Why is the future of computing in the cloud : Analyzing a subject you find in this article. Why is the future of computing in the cloud? Consider the concept of fractional ownership.
At what amount would the company record the building : A company acquired an office building on three acres of land for a lump-sum price of $2,700,000. At what amount would the company record the building
Which firm appears to be purchasing long-term assets : Question - Firm A and Firm B have the following cash flows: Required - Which firm appears to be purchasing long-term assets

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Transparency and accountability

The Federal Trade Commission (FTC) recently issued a report titled, "Data Brokers: A Call for Transparency and Accountability."  What is the role of   the FTC with respect to consumer privacy?  What is the significance/impact of this report?

  Similarity between the network interface adapter

What is the difference and similarity between the network interface adapter at an end-host and at an Ethernet switch(assuming both are attached to a shared-media)

  Marginal cost of capital to raise the needed funds

If Killer needs to raise $220,000 and it expects to generate $100,000 in retained earnings this year, what is its marginal cost of capital to raise.

  Program internal documentation

List at least three types of information that should be included in a program's internal documentation (comments).

  How can all the processes know about this time

What is the earliest global time at which all processes know that everyone knows E2 (φ)? How can all the processes know about this time?

  Why do they allow businesses to use a different method

With IAS and FASB having a preference for one method over another, why do they allow businesses to use a different method?

  What is the percentage of payload data rate

Inter-frame gap: After a packet has been sent, transmitters are required to transmit a total of 96 bits of "idle line" state before transmitting the next packet.

  Computer science and masters in information technology

Write a detail 3 pages about Masters in Computer Science and Masters in Information Technology

  Determine the angle a u t which he first begins to slip

A roofer, having a mass of 70 kg, walks slowly in an upright position down along the surface of a dome that has a radius of curvature of If the coefficient of static friction between his shoes and the dome is μ = 0.7 determine the angle a u t whic..

  Identify the capacities of digital asset management software

Identify the capacities of digital asset management software. What are the top-rated digital asset management software products?

  Discuss role of business end users and information system

Discuss the role of business end users and information system professionals in developing a system solution. How do both roles differ when the solution is developed using prototyping or end-user development?

  Cyber Security-What is Terrorism

Cyber Security-What is Terrorism. Introduction and brief history of Al-Qaeda. Introduction and brief history of Hezbollah

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd