CYB 110 Week 1 Individual Assignment Protecting Data
Instructions: There are many different threats to the confidentiality, integrity, and availability of data-at-rest. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all of these risks. Create a 1-page table in Microsoft® Word or Excel® listing a minimum of five threats using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat. In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected:
- Some or all of the three (Confidentiality, Integrity, and/or Availability)
Include suggestions on how to counter each threat listed. Place your list in the 3 columns of a table in a Microsoft® Word or Excel® document.
Questions & Answers
Have a Question?
Be the first to ask a question about this.