Description
- There are four core items that Cryptography and encryption attempt to protect and preserve and is often referred to as the CIA Triad. Please identify and describe each of the four elements of the CIA Triad and provide a real-world example (it can be hypothetical or real) of how cryptography and encryption can be applied.
Peer Response(s): Read the responses from your peers and offer a constructive critique or additional information that adds substantively to the discussions. Be sure to acknowledge any outside sources you use.
Explanation & Answer
Hello, the work is complete and I am looking forward to work with you in futureGreat moments in your endeavors
Running head: DATA SECURITY
1
Data Security
Institution Affiliation
Instructor’s Name
Student’s Name
Course Code
Data
DATA SECURITY
2
CIA Triad
Every organization, agency, business, individuals, and the government is looking forward
to securing their data and information against unauthorized personnel. However, it is essential
for one to know that there is no agency or person is immune to cyber-attack, all that is done is to
continue improving the systems that protect and preserve the data. Currently, the world is run by
ciphers and codes that enable communication and information delivery from one person to
another. Emails, online entertainment, Automatic teller machines, online shopping, and banking
are all ran by cryptography.
In fact, without cryptography in this stage...
Review
Review
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Similar Content
Related Tags
The Aftermath
by Rhidian Brook
The Second Sex
by Simone de Beauvoir
The Subtle Art of Not Giving a F*ck
by Mark Manson
The Nightingale
by Kristin Hannah
Enders Game
by E. M. Forster
The Girl With The Dragon Tattoo
by Stieg Larsson
The Russian Hoax
by Gregg Jarrett
100 Side Hustles
by Chris Guillebeau
Things That Matter
by Charles Krauthammer