List and explain the critical characteristics of information as defined by the C.I.A. triad.

What will be an ideal response?


?Confidentiality of information ensures that only those with sufficient privileges and a demonstrated need may access certain information. When unauthorized individuals or systems can view information, confidentiality is breached.?Integrity is the quality or state of being whole, complete, and uncorrupted. The integrity of information is threatened when it is exposed to corruption, damage, destruction, or other disruption of its authentic state.?Availability is the characteristic of information that enables user access to information without interference or obstruction and in a usable format.

Computer Science & Information Technology

You might also like to view...

The Internet ________ is the high-speed connection point between networks

Fill in the blank(s) with correct word

Computer Science & Information Technology

When you rasterize a type layer, you convert it from "live" type-type that is selectable and editable-to pixels.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____ constructor is one that requires no arguments.

A. class B. default C. explicit D. write

Computer Science & Information Technology

The ____ is a collection of panels or panel groups.

A. dock B. set C. tag D. pane

Computer Science & Information Technology