SlideShare a Scribd company logo
1 of 2
There are many different threats to the confidentiality, integrity,
and availability of data-at-rest, data-in-transit, and processing.
Some threats affect one of these security risks (like
confidentiality only), and some threats affect more than one or
even all these risks.
Create a 1-to 2 -page table, in Microsoft® Word, listing a
minimum of 6 threats using the column headers and details
below:
Threat – List the threat.
Threat to Type of Data (data-at-rest,data-in-transit, or
processing) – Identify the type.
Confidentiality/Integrity/Availability– Identify whether some or
all are affected by labelling: C, I, and/orA.
Mitigation Suggestion – Describe a mitigation plan in 2-3
sentences.
Example:
Threat: Password Compromise
Threat to Type of Data: Data-At-Rest
Confidentiality/Integrity/Availability: C & I
Mitigation: Employ a strong password that is changed at regular
intervals. Do not share your password or write it down on sticky
notes on your desk.

More Related Content

Similar to There are many different threats to the confidentiality, integrity, .docx

We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxco4spmeley
 
Assignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docxAssignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docxannrodgerson
 
Evaluation of Risk Effects Data CIA and.docx
Evaluation of Risk Effects Data CIA and.docxEvaluation of Risk Effects Data CIA and.docx
Evaluation of Risk Effects Data CIA and.docxwrite4
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computingManoj VNV
 
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxUse speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxgidmanmary
 
Threat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devicesThreat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devicesFrédéric Sagez
 
((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docx((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docxajoy21
 
Fill out the following table for four different IT systems- Note two.docx
Fill out the following table for four different IT systems-  Note two.docxFill out the following table for four different IT systems-  Note two.docx
Fill out the following table for four different IT systems- Note two.docxjkristen1
 
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docxSecurity ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docxbagotjesusa
 
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docxRunning Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docxcowinhelen
 
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...Ulf Mattsson
 
Threat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutDevSecCon
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxspoonerneddy
 
TitleABC123 Version X1IT System Connection TableWhe.docx
TitleABC123 Version X1IT System Connection TableWhe.docxTitleABC123 Version X1IT System Connection TableWhe.docx
TitleABC123 Version X1IT System Connection TableWhe.docxedwardmarivel
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxcockekeshia
 
Discusses at least five emerging threats to information security..pdf
Discusses at least five emerging threats to information security..pdfDiscusses at least five emerging threats to information security..pdf
Discusses at least five emerging threats to information security..pdfaminbijal86
 
HM502Unit 1 Assignment For this assignment, you will create
HM502Unit 1 Assignment For this assignment, you will create HM502Unit 1 Assignment For this assignment, you will create
HM502Unit 1 Assignment For this assignment, you will create SusanaFurman449
 

Similar to There are many different threats to the confidentiality, integrity, .docx (20)

We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docx
 
Assignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docxAssignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docx
 
Evaluation of Risk Effects Data CIA and.docx
Evaluation of Risk Effects Data CIA and.docxEvaluation of Risk Effects Data CIA and.docx
Evaluation of Risk Effects Data CIA and.docx
 
Security in network computing
Security in network computingSecurity in network computing
Security in network computing
 
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docxUse speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
Use speaker notes on each slide I need 6 slides EXCLUDING cover page.docx
 
Threat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devicesThreat Modelling and managed risks for medical devices
Threat Modelling and managed risks for medical devices
 
((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docx((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docx
 
Fill out the following table for four different IT systems- Note two.docx
Fill out the following table for four different IT systems-  Note two.docxFill out the following table for four different IT systems-  Note two.docx
Fill out the following table for four different IT systems- Note two.docx
 
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docxSecurity ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
Security ConceptsDr. Y. ChuCIS3360 Security in Computing.docx
 
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docxRunning Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
 
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
ISACA New York Metro, Developing, Deploying and Managing a Risk-Adjusted Data...
 
Threat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert HurlbutThreat Modeling workshop by Robert Hurlbut
Threat Modeling workshop by Robert Hurlbut
 
InfoSecConcepts.ppt
InfoSecConcepts.pptInfoSecConcepts.ppt
InfoSecConcepts.ppt
 
Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docx
 
TitleABC123 Version X1IT System Connection TableWhe.docx
TitleABC123 Version X1IT System Connection TableWhe.docxTitleABC123 Version X1IT System Connection TableWhe.docx
TitleABC123 Version X1IT System Connection TableWhe.docx
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
 
Discusses at least five emerging threats to information security..pdf
Discusses at least five emerging threats to information security..pdfDiscusses at least five emerging threats to information security..pdf
Discusses at least five emerging threats to information security..pdf
 
Comparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptxComparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptx
 
HM502Unit 1 Assignment For this assignment, you will create
HM502Unit 1 Assignment For this assignment, you will create HM502Unit 1 Assignment For this assignment, you will create
HM502Unit 1 Assignment For this assignment, you will create
 
Information security
Information securityInformation security
Information security
 

More from rorye

There are innumerable pieces of evidence for proving the fact of evo.docx
There are innumerable pieces of evidence for proving the fact of evo.docxThere are innumerable pieces of evidence for proving the fact of evo.docx
There are innumerable pieces of evidence for proving the fact of evo.docxrorye
 
There are many health issues of importance to the American public. A.docx
There are many health issues of importance to the American public. A.docxThere are many health issues of importance to the American public. A.docx
There are many health issues of importance to the American public. A.docxrorye
 
There are lots of movies and TV shows depicting catastrophic outbrea.docx
There are lots of movies and TV shows depicting catastrophic outbrea.docxThere are lots of movies and TV shows depicting catastrophic outbrea.docx
There are lots of movies and TV shows depicting catastrophic outbrea.docxrorye
 
There are many evident trends that impact workforce planning (for ex.docx
There are many evident trends that impact workforce planning (for ex.docxThere are many evident trends that impact workforce planning (for ex.docx
There are many evident trends that impact workforce planning (for ex.docxrorye
 
There are many ethical challenges that have specific implications fo.docx
There are many ethical challenges that have specific implications fo.docxThere are many ethical challenges that have specific implications fo.docx
There are many ethical challenges that have specific implications fo.docxrorye
 
There are many environmental factors influencing the workplace today.docx
There are many environmental factors influencing the workplace today.docxThere are many environmental factors influencing the workplace today.docx
There are many environmental factors influencing the workplace today.docxrorye
 
There are many different views about what Socrates really believ.docx
There are many different views about what Socrates really believ.docxThere are many different views about what Socrates really believ.docx
There are many different views about what Socrates really believ.docxrorye
 
There are many different things that can cause a company’s actual .docx
There are many different things that can cause a company’s actual .docxThere are many different things that can cause a company’s actual .docx
There are many different things that can cause a company’s actual .docxrorye
 
There are five factors to consider when assessing the growing impact.docx
There are five factors to consider when assessing the growing impact.docxThere are five factors to consider when assessing the growing impact.docx
There are five factors to consider when assessing the growing impact.docxrorye
 
There are five questions worth twenty points each.All answers.docx
There are five questions worth twenty points each.All answers.docxThere are five questions worth twenty points each.All answers.docx
There are five questions worth twenty points each.All answers.docxrorye
 
There are enormous disparities in health status and access to health.docx
There are enormous disparities in health status and access to health.docxThere are enormous disparities in health status and access to health.docx
There are enormous disparities in health status and access to health.docxrorye
 
There are four basic ways a divisionally structured firm could be .docx
There are four basic ways a divisionally structured firm could be .docxThere are four basic ways a divisionally structured firm could be .docx
There are four basic ways a divisionally structured firm could be .docxrorye
 
There are many agencies that oversee a variety of public health fu.docx
There are many agencies that oversee a variety of public health fu.docxThere are many agencies that oversee a variety of public health fu.docx
There are many agencies that oversee a variety of public health fu.docxrorye
 
There are five core factors of knowledge and skills that nurses.docx
There are five core factors of knowledge and skills that nurses.docxThere are five core factors of knowledge and skills that nurses.docx
There are five core factors of knowledge and skills that nurses.docxrorye
 
There are alternative methods to Web recruiting—internal transfer, p.docx
There are alternative methods to Web recruiting—internal transfer, p.docxThere are alternative methods to Web recruiting—internal transfer, p.docx
There are alternative methods to Web recruiting—internal transfer, p.docxrorye
 
There are hundreds of database types and numerous database classes (.docx
There are hundreds of database types and numerous database classes (.docxThere are hundreds of database types and numerous database classes (.docx
There are hundreds of database types and numerous database classes (.docxrorye
 
There are challenges to agenda building that if not dealt with c.docx
There are challenges to agenda building that if not dealt with c.docxThere are challenges to agenda building that if not dealt with c.docx
There are challenges to agenda building that if not dealt with c.docxrorye
 
There are four questionsQuestion 1 - solve and show work for one p.docx
There are four questionsQuestion 1 - solve and show work for one p.docxThere are four questionsQuestion 1 - solve and show work for one p.docx
There are four questionsQuestion 1 - solve and show work for one p.docxrorye
 
There are four primary goals of confinement in the juvenile justice .docx
There are four primary goals of confinement in the juvenile justice .docxThere are four primary goals of confinement in the juvenile justice .docx
There are four primary goals of confinement in the juvenile justice .docxrorye
 
There are attached-REL 2011(assignment instructions)-First .docx
There are attached-REL 2011(assignment instructions)-First .docxThere are attached-REL 2011(assignment instructions)-First .docx
There are attached-REL 2011(assignment instructions)-First .docxrorye
 

More from rorye (20)

There are innumerable pieces of evidence for proving the fact of evo.docx
There are innumerable pieces of evidence for proving the fact of evo.docxThere are innumerable pieces of evidence for proving the fact of evo.docx
There are innumerable pieces of evidence for proving the fact of evo.docx
 
There are many health issues of importance to the American public. A.docx
There are many health issues of importance to the American public. A.docxThere are many health issues of importance to the American public. A.docx
There are many health issues of importance to the American public. A.docx
 
There are lots of movies and TV shows depicting catastrophic outbrea.docx
There are lots of movies and TV shows depicting catastrophic outbrea.docxThere are lots of movies and TV shows depicting catastrophic outbrea.docx
There are lots of movies and TV shows depicting catastrophic outbrea.docx
 
There are many evident trends that impact workforce planning (for ex.docx
There are many evident trends that impact workforce planning (for ex.docxThere are many evident trends that impact workforce planning (for ex.docx
There are many evident trends that impact workforce planning (for ex.docx
 
There are many ethical challenges that have specific implications fo.docx
There are many ethical challenges that have specific implications fo.docxThere are many ethical challenges that have specific implications fo.docx
There are many ethical challenges that have specific implications fo.docx
 
There are many environmental factors influencing the workplace today.docx
There are many environmental factors influencing the workplace today.docxThere are many environmental factors influencing the workplace today.docx
There are many environmental factors influencing the workplace today.docx
 
There are many different views about what Socrates really believ.docx
There are many different views about what Socrates really believ.docxThere are many different views about what Socrates really believ.docx
There are many different views about what Socrates really believ.docx
 
There are many different things that can cause a company’s actual .docx
There are many different things that can cause a company’s actual .docxThere are many different things that can cause a company’s actual .docx
There are many different things that can cause a company’s actual .docx
 
There are five factors to consider when assessing the growing impact.docx
There are five factors to consider when assessing the growing impact.docxThere are five factors to consider when assessing the growing impact.docx
There are five factors to consider when assessing the growing impact.docx
 
There are five questions worth twenty points each.All answers.docx
There are five questions worth twenty points each.All answers.docxThere are five questions worth twenty points each.All answers.docx
There are five questions worth twenty points each.All answers.docx
 
There are enormous disparities in health status and access to health.docx
There are enormous disparities in health status and access to health.docxThere are enormous disparities in health status and access to health.docx
There are enormous disparities in health status and access to health.docx
 
There are four basic ways a divisionally structured firm could be .docx
There are four basic ways a divisionally structured firm could be .docxThere are four basic ways a divisionally structured firm could be .docx
There are four basic ways a divisionally structured firm could be .docx
 
There are many agencies that oversee a variety of public health fu.docx
There are many agencies that oversee a variety of public health fu.docxThere are many agencies that oversee a variety of public health fu.docx
There are many agencies that oversee a variety of public health fu.docx
 
There are five core factors of knowledge and skills that nurses.docx
There are five core factors of knowledge and skills that nurses.docxThere are five core factors of knowledge and skills that nurses.docx
There are five core factors of knowledge and skills that nurses.docx
 
There are alternative methods to Web recruiting—internal transfer, p.docx
There are alternative methods to Web recruiting—internal transfer, p.docxThere are alternative methods to Web recruiting—internal transfer, p.docx
There are alternative methods to Web recruiting—internal transfer, p.docx
 
There are hundreds of database types and numerous database classes (.docx
There are hundreds of database types and numerous database classes (.docxThere are hundreds of database types and numerous database classes (.docx
There are hundreds of database types and numerous database classes (.docx
 
There are challenges to agenda building that if not dealt with c.docx
There are challenges to agenda building that if not dealt with c.docxThere are challenges to agenda building that if not dealt with c.docx
There are challenges to agenda building that if not dealt with c.docx
 
There are four questionsQuestion 1 - solve and show work for one p.docx
There are four questionsQuestion 1 - solve and show work for one p.docxThere are four questionsQuestion 1 - solve and show work for one p.docx
There are four questionsQuestion 1 - solve and show work for one p.docx
 
There are four primary goals of confinement in the juvenile justice .docx
There are four primary goals of confinement in the juvenile justice .docxThere are four primary goals of confinement in the juvenile justice .docx
There are four primary goals of confinement in the juvenile justice .docx
 
There are attached-REL 2011(assignment instructions)-First .docx
There are attached-REL 2011(assignment instructions)-First .docxThere are attached-REL 2011(assignment instructions)-First .docx
There are attached-REL 2011(assignment instructions)-First .docx
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 

There are many different threats to the confidentiality, integrity, .docx

  • 1. There are many different threats to the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all these risks. Create a 1-to 2 -page table, in Microsoft® Word, listing a minimum of 6 threats using the column headers and details below: Threat – List the threat. Threat to Type of Data (data-at-rest,data-in-transit, or processing) – Identify the type. Confidentiality/Integrity/Availability– Identify whether some or all are affected by labelling: C, I, and/orA. Mitigation Suggestion – Describe a mitigation plan in 2-3 sentences. Example: Threat: Password Compromise Threat to Type of Data: Data-At-Rest Confidentiality/Integrity/Availability: C & I
  • 2. Mitigation: Employ a strong password that is changed at regular intervals. Do not share your password or write it down on sticky notes on your desk.