VamLS2494 VamLS2494
  • 20-10-2021
  • Computers and Technology
contestada

what threat do insiders with authorized access to information or information systems pose

Respuesta :

marcus1185
marcus1185 marcus1185
  • 20-10-2021

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

Answer Link

Otras preguntas

Is there a relationship between the different of the integers and the distance between them?
314.16 rounded to the nearest tenth
what are the next two numbers 0.06, 0.12, 0.18
Find the ordered pairs for x and y intercepts of the equation 3x - 2y =18
If the side of a square is x + 5, and the square’s area is 225, what is x?
Explain how lines of latitude and longitude help people find locations on earth?
Kesha spend a total of $9.60 on a new shoe laces each pair cost $1.20 how many pairs of shoe laces did she buy
The table shows the outputs y for different inputs x: Input (x) 5 6 7 8 Output (y) 2 5 8 11 Part A: Do the data in this table represent a function? Justify your
Three hundred Spartans made a famous stand against the Persian army in the name of freedom at _
Consider the function f(x) = 4x2 + 5. Find the value of f(x) when x = 2 and select the correct answer below.