How is the CIA triad used to evaluate encryption methods?

What will be an ideal response?


ANSWER: To protect data at rest, in use, and in motion, encryption methods are primarily
evaluated by three benchmarks:
* confidentiality-Data can only be viewed by its intended recipient or at its intended destination.
* integrity-Data is not modified in the time after the sender transmits it and before the receiver picks it up.
* availability-Data is available and accessible to the intended recipient when needed, meaning the sender is accountable for successful delivery of the data.
Together, these three principles form the standard security model called the CIA (confidentiality, integrity, and availability) triad.

Computer Science & Information Technology

You might also like to view...

Select the void element that can configure a Flash .swf on a web page:

a. ```

By default, Excel copies formulas with ____________________ references.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ________ symbol is used in structured references to refer to the current row

Fill in the blank(s) with correct word

Computer Science & Information Technology

List some examples of routing metrics that might be used to determine the best path for data.

What will be an ideal response?

Computer Science & Information Technology