Core items that Cryptography and encryption attempt to protect and preserve and is often referred to as the CIA Triad.

User Generated

nllnccn2753

Writing

Description

  • There are four core items that Cryptography and encryption attempt to protect and preserve and is often referred to as the CIA Triad. Please identify and describe each of the four elements of the CIA Triad and provide a real-world example (it can be hypothetical or real) of how cryptography and encryption can be applied.

Peer Response(s): Read the responses from your peers and offer a constructive critique or additional information that adds substantively to the discussions. Be sure to acknowledge any outside sources you use.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hello, the work is complete and I am looking forward to work with you in futureGreat moments in your endeavors

Running head: DATA SECURITY

1

Data Security
Institution Affiliation
Instructor’s Name
Student’s Name
Course Code
Data

DATA SECURITY

2
CIA Triad

Every organization, agency, business, individuals, and the government is looking forward
to securing their data and information against unauthorized personnel. However, it is essential
for one to know that there is no agency or person is immune to cyber-attack, all that is done is to
continue improving the systems that protect and preserve the data. Currently, the world is run by
ciphers and codes that enable communication and information delivery from one person to
another. Emails, online entertainment, Automatic teller machines, online shopping, and banking
are all ran by cryptography.
In fact, without cryptography in this stage...


Anonymous
Nice! Really impressed with the quality.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags