VamLS2494 VamLS2494
  • 20-10-2021
  • Computers and Technology
contestada

what threat do insiders with authorized access to information or information systems pose

Respuesta :

marcus1185
marcus1185 marcus1185
  • 20-10-2021

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

Answer Link

Otras preguntas

During which of the following did the Allies destroy Japan's naval advantage? (5 points) Battle of Iwo Jima Battle of Leyte Gulf Battle of Midway Battle of Okin
In new postwar democracies, there were frequent changes in government. Note one or more reasons for why this happened.
what is 4.3h=81.7 solving
Names of tangible objects are called____ nouns. abstract proper concrete common
A noble who has trained and proven himself to be worthy of this title
How is H.G wells fictional world in war of the worlds similar to the real world
is 5/6 closer to 1 or 0
Clarie's backyard is in the shape of a rectangle and has a length of 19.5 feet. It cost her $945 to fence in the yard. If fencing costs $15 per foot, what is th
what do pyramids show about ancient Egypt?
complete graphing table showing janice is 7 years older than tam