Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Protecting Data

There are many different threats to the confidentiality, integrity, and availability of data-at-rest. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all of these risks.

Create a 1-page table in Microsoft® Word or Excel® listing a minimum of five threats using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat.

In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected:

  • Confidentiality
  • Integrity
  • Availability
  • Some or all of the three (Confidentiality, Integrity, and/or Availability)

Include suggestions on how to counter each threat listed.

Place your list in the 3 columns of a table in a Microsoft® Word or Excel® document.

Submit your assignment using the Assignment Files tab.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question