Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Assignment Content There are many different threats to the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats affect one of these security ris

Assignment Content There are many different threats to the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all these risks. Createa 1-to 2 -page table, in Microsoft®Word, listing a minimum of 6 threats using the column headers and details below: Threat – List the threat. Threat to Type of Data (data-at-rest,data-in-transit, or processing) – Identify the type. Confidentiality/Integrity/Availability– Identify whether some or all are affected by labelling: C, I, and/orA. Mitigation Suggestion – Describe a mitigation plan in 2-3 sentences. Example:Threat: Password CompromiseThreat to Type of Data: Data-At-RestConfidentiality/Integrity/Availability: C & IMitigation: Employ a strong password that is changed at regular intervals. Do not share your password or write it down on sticky notes on your desk. Include a short paragraph that highlights two access control techniques or policies that enforce security. Cite at least two resources within the assignment in APA format.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question