SlideShare a Scribd company logo
1 of 3
Assignment Content
Many different threats can arise to the confidentiality, integrity,
and availability of data-at-rest, data-in-transit, and processing.
Some threats may affect only 1 of these security risks (like
confidentiality only), and other threats affect more than 1 or
even all these risks.
Create
a 1- to 2-page table in Microsoft Word identifying a minimum
of 6 threats using the column headers and details below:
Threat
Threat to Type of Data
Confidentiality/Integrity/Availability
Mitigation Suggestion
Within your table:
Identify relevant threats. List 1 per column.
Determine the type of data threatened (data-at-rest, data-in-
transit, or processing). Identify the data type in the column.
Determine if confidentiality, integrity, or availability was
affected. Use the labels C, I, and/or A in the column.
Describe the mitigation plan in 2 to 3 sentences in the column.
Example:
Threat
: Password Compromise
Threat to Type of Data
: Data-At-Rest
Confidentiality/Integrity/Availability
: C & I
Mitigation
: Employ a strong password that is changed at regular intervals.
Do not share your password or write it down on sticky notes on
your desk.
Include
a short paragraph that highlights 2 access control techniques or
policies that enforce security.
Cite
at least 2 resources to support your assignment.
Format
your assignment according to APA guidelines.
Submit
your assignment.
Resources
Center for Writing Excellence
Reference and Citation Generator
Grammar and Writing Guides
Copyright 2020 by University of Phoenix. All rights reserved.
Use this space to build your submission.
You can add text, images, and files.Add Content

More Related Content

Similar to Assignment ContentMany different threats can arise to the .docx

Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxspoonerneddy
 
For your selected target organization perform research and examine phy.pdf
For your selected target organization perform research and examine phy.pdfFor your selected target organization perform research and examine phy.pdf
For your selected target organization perform research and examine phy.pdfgargtex
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxcockekeshia
 
Assignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docxAssignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docxannrodgerson
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxsheronlewthwaite
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxco4spmeley
 
Evaluation of Risk Effects Data CIA and.docx
Evaluation of Risk Effects Data CIA and.docxEvaluation of Risk Effects Data CIA and.docx
Evaluation of Risk Effects Data CIA and.docxwrite4
 
The list of references to the required reading are list below  W.docx
The list of references to the required reading are list below  W.docxThe list of references to the required reading are list below  W.docx
The list of references to the required reading are list below  W.docxcdorothy
 
TitleABC123 Version X1IT System Connection TableWhe.docx
TitleABC123 Version X1IT System Connection TableWhe.docxTitleABC123 Version X1IT System Connection TableWhe.docx
TitleABC123 Version X1IT System Connection TableWhe.docxedwardmarivel
 
Fill out the following table for four different IT systems- Note two.docx
Fill out the following table for four different IT systems-  Note two.docxFill out the following table for four different IT systems-  Note two.docx
Fill out the following table for four different IT systems- Note two.docxjkristen1
 
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docxRunning Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docxcowinhelen
 
((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docx((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docxajoy21
 

Similar to Assignment ContentMany different threats can arise to the .docx (12)

Answer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docxAnswer the following questions. Each question response should be at .docx
Answer the following questions. Each question response should be at .docx
 
For your selected target organization perform research and examine phy.pdf
For your selected target organization perform research and examine phy.pdfFor your selected target organization perform research and examine phy.pdf
For your selected target organization perform research and examine phy.pdf
 
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docxWEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
WEEK 3 ESSAY QUESTIONS Instructions Answer all questions .docx
 
Assignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docxAssignment 2 CybersecurityWe use computers and electronic systems.docx
Assignment 2 CybersecurityWe use computers and electronic systems.docx
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docx
 
We use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docxWe use computers and electronic systems to run and store just about .docx
We use computers and electronic systems to run and store just about .docx
 
Evaluation of Risk Effects Data CIA and.docx
Evaluation of Risk Effects Data CIA and.docxEvaluation of Risk Effects Data CIA and.docx
Evaluation of Risk Effects Data CIA and.docx
 
The list of references to the required reading are list below  W.docx
The list of references to the required reading are list below  W.docxThe list of references to the required reading are list below  W.docx
The list of references to the required reading are list below  W.docx
 
TitleABC123 Version X1IT System Connection TableWhe.docx
TitleABC123 Version X1IT System Connection TableWhe.docxTitleABC123 Version X1IT System Connection TableWhe.docx
TitleABC123 Version X1IT System Connection TableWhe.docx
 
Fill out the following table for four different IT systems- Note two.docx
Fill out the following table for four different IT systems-  Note two.docxFill out the following table for four different IT systems-  Note two.docx
Fill out the following table for four different IT systems- Note two.docx
 
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docxRunning Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
Running Head IT STRATEGIC PLAN1Nageswara rao Beer.docx
 
((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docx((Anatomy of a Security IncidentAttack)) will survey current threat.docx
((Anatomy of a Security IncidentAttack)) will survey current threat.docx
 

More from williejgrant41084

Assignment ContentIn your first meeting, you will have to .docx
Assignment ContentIn your first meeting, you will have to .docxAssignment ContentIn your first meeting, you will have to .docx
Assignment ContentIn your first meeting, you will have to .docxwilliejgrant41084
 
Assignment ContentMany information security policies cross the.docx
Assignment ContentMany information security policies cross the.docxAssignment ContentMany information security policies cross the.docx
Assignment ContentMany information security policies cross the.docxwilliejgrant41084
 
Assignment ContentMaintaining a healthy work-life balance .docx
Assignment ContentMaintaining a healthy work-life balance .docxAssignment ContentMaintaining a healthy work-life balance .docx
Assignment ContentMaintaining a healthy work-life balance .docxwilliejgrant41084
 
Assignment ContentIn this section, you will be evaluating .docx
Assignment ContentIn this section, you will be evaluating .docxAssignment ContentIn this section, you will be evaluating .docx
Assignment ContentIn this section, you will be evaluating .docxwilliejgrant41084
 
Assignment ContentIssues related prejudice, discrimination.docx
Assignment ContentIssues related prejudice, discrimination.docxAssignment ContentIssues related prejudice, discrimination.docx
Assignment ContentIssues related prejudice, discrimination.docxwilliejgrant41084
 
Assignment ContentIn your first meeting, you will have to pres.docx
Assignment ContentIn your first meeting, you will have to pres.docxAssignment ContentIn your first meeting, you will have to pres.docx
Assignment ContentIn your first meeting, you will have to pres.docxwilliejgrant41084
 
Assignment ContentIn Week 1, you discussed GIG, Inc.s ben.docx
Assignment ContentIn Week 1, you discussed GIG, Inc.s ben.docxAssignment ContentIn Week 1, you discussed GIG, Inc.s ben.docx
Assignment ContentIn Week 1, you discussed GIG, Inc.s ben.docxwilliejgrant41084
 
Assignment ContentIn the health care industry, a variety of st.docx
Assignment ContentIn the health care industry, a variety of st.docxAssignment ContentIn the health care industry, a variety of st.docx
Assignment ContentIn the health care industry, a variety of st.docxwilliejgrant41084
 
Assignment ContentIn the health care industry, a variety o.docx
Assignment ContentIn the health care industry, a variety o.docxAssignment ContentIn the health care industry, a variety o.docx
Assignment ContentIn the health care industry, a variety o.docxwilliejgrant41084
 
Assignment ContentIn the workplace, a team manages many p.docx
Assignment ContentIn the workplace, a team manages many p.docxAssignment ContentIn the workplace, a team manages many p.docx
Assignment ContentIn the workplace, a team manages many p.docxwilliejgrant41084
 
Assignment ContentImagine that your hospital has recently me.docx
Assignment ContentImagine that your hospital has recently me.docxAssignment ContentImagine that your hospital has recently me.docx
Assignment ContentImagine that your hospital has recently me.docxwilliejgrant41084
 
Assignment ContentImagine you have been working for a health c.docx
Assignment ContentImagine you have been working for a health c.docxAssignment ContentImagine you have been working for a health c.docx
Assignment ContentImagine you have been working for a health c.docxwilliejgrant41084
 
Assignment ContentImagine your Learning Team is the human reso.docx
Assignment ContentImagine your Learning Team is the human reso.docxAssignment ContentImagine your Learning Team is the human reso.docx
Assignment ContentImagine your Learning Team is the human reso.docxwilliejgrant41084
 
Assignment ContentImagine you have been hired to conduct a s.docx
Assignment ContentImagine you have been hired to conduct a s.docxAssignment ContentImagine you have been hired to conduct a s.docx
Assignment ContentImagine you have been hired to conduct a s.docxwilliejgrant41084
 
Assignment ContentImagine you are working as a manager in a lo.docx
Assignment ContentImagine you are working as a manager in a lo.docxAssignment ContentImagine you are working as a manager in a lo.docx
Assignment ContentImagine you are working as a manager in a lo.docxwilliejgrant41084
 
Assignment ContentImagine you have just been promoted as.docx
Assignment ContentImagine you have just been promoted as.docxAssignment ContentImagine you have just been promoted as.docx
Assignment ContentImagine you have just been promoted as.docxwilliejgrant41084
 
Assignment ContentImagine you are the office manager at .docx
Assignment ContentImagine you are the office manager at .docxAssignment ContentImagine you are the office manager at .docx
Assignment ContentImagine you are the office manager at .docxwilliejgrant41084
 
Assignment ContentImagine you are asked to design an inf.docx
Assignment ContentImagine you are asked to design an inf.docxAssignment ContentImagine you are asked to design an inf.docx
Assignment ContentImagine you are asked to design an inf.docxwilliejgrant41084
 
Assignment ContentImagine you are an IT manager for an org.docx
Assignment ContentImagine you are an IT manager for an org.docxAssignment ContentImagine you are an IT manager for an org.docx
Assignment ContentImagine you are an IT manager for an org.docxwilliejgrant41084
 
Assignment ContentImagine you are being vetted for a manager.docx
Assignment ContentImagine you are being vetted for a manager.docxAssignment ContentImagine you are being vetted for a manager.docx
Assignment ContentImagine you are being vetted for a manager.docxwilliejgrant41084
 

More from williejgrant41084 (20)

Assignment ContentIn your first meeting, you will have to .docx
Assignment ContentIn your first meeting, you will have to .docxAssignment ContentIn your first meeting, you will have to .docx
Assignment ContentIn your first meeting, you will have to .docx
 
Assignment ContentMany information security policies cross the.docx
Assignment ContentMany information security policies cross the.docxAssignment ContentMany information security policies cross the.docx
Assignment ContentMany information security policies cross the.docx
 
Assignment ContentMaintaining a healthy work-life balance .docx
Assignment ContentMaintaining a healthy work-life balance .docxAssignment ContentMaintaining a healthy work-life balance .docx
Assignment ContentMaintaining a healthy work-life balance .docx
 
Assignment ContentIn this section, you will be evaluating .docx
Assignment ContentIn this section, you will be evaluating .docxAssignment ContentIn this section, you will be evaluating .docx
Assignment ContentIn this section, you will be evaluating .docx
 
Assignment ContentIssues related prejudice, discrimination.docx
Assignment ContentIssues related prejudice, discrimination.docxAssignment ContentIssues related prejudice, discrimination.docx
Assignment ContentIssues related prejudice, discrimination.docx
 
Assignment ContentIn your first meeting, you will have to pres.docx
Assignment ContentIn your first meeting, you will have to pres.docxAssignment ContentIn your first meeting, you will have to pres.docx
Assignment ContentIn your first meeting, you will have to pres.docx
 
Assignment ContentIn Week 1, you discussed GIG, Inc.s ben.docx
Assignment ContentIn Week 1, you discussed GIG, Inc.s ben.docxAssignment ContentIn Week 1, you discussed GIG, Inc.s ben.docx
Assignment ContentIn Week 1, you discussed GIG, Inc.s ben.docx
 
Assignment ContentIn the health care industry, a variety of st.docx
Assignment ContentIn the health care industry, a variety of st.docxAssignment ContentIn the health care industry, a variety of st.docx
Assignment ContentIn the health care industry, a variety of st.docx
 
Assignment ContentIn the health care industry, a variety o.docx
Assignment ContentIn the health care industry, a variety o.docxAssignment ContentIn the health care industry, a variety o.docx
Assignment ContentIn the health care industry, a variety o.docx
 
Assignment ContentIn the workplace, a team manages many p.docx
Assignment ContentIn the workplace, a team manages many p.docxAssignment ContentIn the workplace, a team manages many p.docx
Assignment ContentIn the workplace, a team manages many p.docx
 
Assignment ContentImagine that your hospital has recently me.docx
Assignment ContentImagine that your hospital has recently me.docxAssignment ContentImagine that your hospital has recently me.docx
Assignment ContentImagine that your hospital has recently me.docx
 
Assignment ContentImagine you have been working for a health c.docx
Assignment ContentImagine you have been working for a health c.docxAssignment ContentImagine you have been working for a health c.docx
Assignment ContentImagine you have been working for a health c.docx
 
Assignment ContentImagine your Learning Team is the human reso.docx
Assignment ContentImagine your Learning Team is the human reso.docxAssignment ContentImagine your Learning Team is the human reso.docx
Assignment ContentImagine your Learning Team is the human reso.docx
 
Assignment ContentImagine you have been hired to conduct a s.docx
Assignment ContentImagine you have been hired to conduct a s.docxAssignment ContentImagine you have been hired to conduct a s.docx
Assignment ContentImagine you have been hired to conduct a s.docx
 
Assignment ContentImagine you are working as a manager in a lo.docx
Assignment ContentImagine you are working as a manager in a lo.docxAssignment ContentImagine you are working as a manager in a lo.docx
Assignment ContentImagine you are working as a manager in a lo.docx
 
Assignment ContentImagine you have just been promoted as.docx
Assignment ContentImagine you have just been promoted as.docxAssignment ContentImagine you have just been promoted as.docx
Assignment ContentImagine you have just been promoted as.docx
 
Assignment ContentImagine you are the office manager at .docx
Assignment ContentImagine you are the office manager at .docxAssignment ContentImagine you are the office manager at .docx
Assignment ContentImagine you are the office manager at .docx
 
Assignment ContentImagine you are asked to design an inf.docx
Assignment ContentImagine you are asked to design an inf.docxAssignment ContentImagine you are asked to design an inf.docx
Assignment ContentImagine you are asked to design an inf.docx
 
Assignment ContentImagine you are an IT manager for an org.docx
Assignment ContentImagine you are an IT manager for an org.docxAssignment ContentImagine you are an IT manager for an org.docx
Assignment ContentImagine you are an IT manager for an org.docx
 
Assignment ContentImagine you are being vetted for a manager.docx
Assignment ContentImagine you are being vetted for a manager.docxAssignment ContentImagine you are being vetted for a manager.docx
Assignment ContentImagine you are being vetted for a manager.docx
 

Recently uploaded

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSean M. Fox
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppCeline George
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...Nguyen Thanh Tu Collection
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi RajagopalEADTU
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfJerry Chew
 

Recently uploaded (20)

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 

Assignment ContentMany different threats can arise to the .docx

  • 1. Assignment Content Many different threats can arise to the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats may affect only 1 of these security risks (like confidentiality only), and other threats affect more than 1 or even all these risks. Create a 1- to 2-page table in Microsoft Word identifying a minimum of 6 threats using the column headers and details below: Threat Threat to Type of Data Confidentiality/Integrity/Availability Mitigation Suggestion Within your table: Identify relevant threats. List 1 per column. Determine the type of data threatened (data-at-rest, data-in- transit, or processing). Identify the data type in the column. Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A in the column.
  • 2. Describe the mitigation plan in 2 to 3 sentences in the column. Example: Threat : Password Compromise Threat to Type of Data : Data-At-Rest Confidentiality/Integrity/Availability : C & I Mitigation : Employ a strong password that is changed at regular intervals. Do not share your password or write it down on sticky notes on your desk. Include a short paragraph that highlights 2 access control techniques or policies that enforce security. Cite at least 2 resources to support your assignment. Format your assignment according to APA guidelines. Submit your assignment.
  • 3. Resources Center for Writing Excellence Reference and Citation Generator Grammar and Writing Guides Copyright 2020 by University of Phoenix. All rights reserved. Use this space to build your submission. You can add text, images, and files.Add Content