subject

Are the following scenarios a breach of confidentiality, integrity or availability? Explain your reasoning. In September of 2017, Equifax announced a data breach that exposed the personal information of 147 million people. How did this exposure breach the CIA Triad?

Downloading what appears to be a legitimate app, a user installs malware which contains keylogging software. What type of breach is the downloading of malware?

An email phishing attack results in ransomware, in which the files and folders on a computer are encrypted. What type of breach is ransomware?

How do fake social media accounts breach the CIA Triad?

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 09:50, laurentsofia09
Assume that you have an sorted array of records. assume that the length of the array (n) is known. give two different methods to search for a specific value in this array. you can use english or pseudo-code for your algorithm. what is the time complexity for each algorithm and why?
Answers: 1
image
Computers and Technology, 23.06.2019 15:10, cathyjuan
What role did women fill during world war ii?
Answers: 1
image
Computers and Technology, 23.06.2019 21:00, tiffg2588
Will this setup result in what kathy wants to print?
Answers: 2
image
Computers and Technology, 24.06.2019 05:30, lolololol21
Cómo pongo un tomo de llamada sin pagar?
Answers: 1
You know the right answer?
Are the following scenarios a breach of confidentiality, integrity or availability? Explain your rea...

Questions in other subjects:

Konu
Mathematics, 08.10.2021 14:00
Konu
Mathematics, 08.10.2021 14:00