Alfaisal University Introduction to Cyber Security Tasks

User Generated

fnennn577

Engineering

Description

 contains 6 tasks:

Task 1: Provide a non-software example scenario where the confidentiality of data is breached.

Task 2: Provide a non-software example scenario where the integrity of data is breached.

Task 3: Provide a non-software example scenario where the availability of service is breached.

Task 4: Provide a real software example scenario (provide the reference) where the confidentiality of data was breached.

Task 5: Provide a real software example scenario (provide the reference) where the integrity of data was breached.

Task 6: Provide a real software example scenario (provide the reference) where the availability of service was breached.


Unformatted Attachment Preview

Introduction to Cyber Security . For each of the tasks below, write at least a 5-line paragraph. Task 1: Provide a non-software example scenario where the confidentiality of data is breached. Task 2: Provide a non-software example scenario where the integrity of data is breached. Task 3: Provide a non-software example scenario where the availability of service is breached. Task 4: Provide a real software example scenario (provide the reference) where the confidentiality of data was breached. Task 5: Provide a real software example scenario (provide the reference) where the integrity of data was breached. Task 6: Provide a real software example scenario (provide the reference) where the availability of service was breached. . The description should be enough for other students of a BS Cybersecurity program to understand it.
Purchase answer to see full attachment
Explanation & Answer:
6 Tasks
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.

Running Head: INTRODUCTION TO CYBER SECURITY (CIA)

Introduction to cyber security (CIA)

Name
Institution
Professor
Course
Date

1

INTRODUCTION TO CYBER SECURITY (CIA)

2

CIA stands for Confidentiality, Integrity, and availability. It refers to the 3 pillars for the
information security of any organization (Yeboah-Boateng, 2013). It is imperative to note that
confidentiality is meant to ensure that the information is only accessed and used by authorized
users. On the other hand, integrity is meant to ensure that data or information is both trustworthy
and authentic. Finally, availability ensures that information is available every time it is needed.
This paper provides examples of a scenario of each of the CIA elements.
Task 1
It should be no...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags