Threats to Confidentiality, Integrity, and Availability

Computer Science


University of Phoenix

Question Description

Assignment Content

  1. Many different threats can arise to the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats may affect only 1 of these security risks (like confidentiality only), and other threats affect more than 1 or even all these risks. Create a 1- to 2-page table in Microsoft Word identifying a minimum of 6 threats using the column headers and details below:
    • Threat
    • Threat to Type of Data
    • Confidentiality/Integrity/Availability
    • Mitigation Suggestion

    Within your table:
    • Identify relevant threats. List 1 per column.
    • Determine the type of data threatened (data-at-rest, data-in-transit, or processing). Identify the data type in the column.
    • Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A in the column.
    • Describe the mitigation plan in 2 to 3 sentences in the column.
    Threat: Password CompromiseThreat to Type of Data: Data-At-RestConfidentiality/Integrity/Availability: C & IMitigation: Employ a strong password that is changed at regular intervals. Do not share your password or write it down on sticky notes on your desk.Include a short paragraph that highlights 2 access control techniques or policies that enforce security. Cite at least 2 resources to support your assignment.
    Format your assignment according to APA guidelines.

Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Similar Questions
Related Tags