Description
contains 6 tasks:
Task 1: Provide a non-software example scenario where the confidentiality of data is breached.
Task 2: Provide a non-software example scenario where the integrity of data is breached.
Task 3: Provide a non-software example scenario where the availability of service is breached.
Task 4: Provide a real software example scenario (provide the reference) where the confidentiality of data was breached.
Task 5: Provide a real software example scenario (provide the reference) where the integrity of data was breached.
Task 6: Provide a real software example scenario (provide the reference) where the availability of service was breached.
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
View attached explanation and answer. Let me know if you have any questions.
Running Head: INTRODUCTION TO CYBER SECURITY (CIA)
Introduction to cyber security (CIA)
Name
Institution
Professor
Course
Date
1
INTRODUCTION TO CYBER SECURITY (CIA)
2
CIA stands for Confidentiality, Integrity, and availability. It refers to the 3 pillars for the
information security of any organization (Yeboah-Boateng, 2013). It is imperative to note that
confidentiality is meant to ensure that the information is only accessed and used by authorized
users. On the other hand, integrity is meant to ensure that data or information is both trustworthy
and authentic. Finally, availability ensures that information is available every time it is needed.
This paper provides examples of a scenario of each of the CIA elements.
Task 1
It should be no...