COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
certified, integrated, accessible
|
|
continuity, integrity, accessibility
|
|
confidentiality, integrity, availability
|
|
confidentiality, installation, assembly
|
Detailed explanation-1: -An effective system satisfies all three components: confidentiality, integrity, and availability. An information security system that is lacking in one of the three aspects of the CIA triad is insufficient.
Detailed explanation-2: -Confidentiality, integrity and availability together are considered the three most important concepts within information security. Considering these three principles together within the framework of the “triad” can help guide the development of security policies for organizations.
Detailed explanation-3: -The CIA Triad-Confidentiality, Integrity, and Availability-is a guiding model in information security. A comprehensive information security strategy includes policies and security controls that minimize threats to these three crucial components.
Detailed explanation-4: -The CIA triad refers to an information security model made up of the three main components: confidentiality, integrity and availability.
Detailed explanation-5: -The three fundamental bases of information security are represented in the CIA triad: confidentiality, integrity and availability. Put simply, confidentiality is limiting data access, integrity is ensuring your data is accurate, and availability is making sure it is accessible to those who need it.