VamLS2494 VamLS2494
  • 20-10-2021
  • Computers and Technology
contestada

what threat do insiders with authorized access to information or information systems pose

Respuesta :

marcus1185
marcus1185 marcus1185
  • 20-10-2021

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

Answer Link

Otras preguntas

How can you tell that a fraction is a unit fraction?
Why do the black petitioners believe that owning land is essential to the enjoyment of freedom?
How do estimate the difference of mixed numbers
How many whole servings of 3/2 cups are in 67/3 cups of fruit punch? A) 12 servings B) 14 servings C) 15 servings D) 17 servings
Pls help on this question I really don't understand it that well ???!!?!?!?!
The ancient Hebrews' laws of God are called A. the Ten Commandments. B. catechism. C. orthodoxy. D. the Twelve Tables.
Need just a correct answer
Suppose that $4500 is placed in an account that pays 8% interest compounded each year. Assume that no withdrawals are made from the account. Follow the inst
Number 8 not 7 thanks
What book did Hitler write while in prison in 1923–1924, in which he laid out his plans for promoting the master Aryan race through extreme nationalism, racism,