The CIA Triad Scenarios

Ace your homework & exams now with Quizwiz!

A hacker uses a man-in-the-middle attack to intercept wireless traffic from users.

Confidentiality

A technology firm maintains an alternate site that is running 24/7, and operations can be moved to this location in the event of a major disaster.

Availability

A hospital only allows authorized healthcare personnel within one department access to patient Personal Identifiable Information. When employees move to another department, that access is revoked.

Confidentiality

Employees need to have key cards in order to enter their company offices.

Confidentiality

Only authorized personnel at a company have write access to certain files. All other employees have only read access to these files.

Confidentiality

A company hashes their data files in order to monitor whether information has been tampered with.

Integrity

A hacker was able to crack a hashed message and change its contents.

Integrity

A company employs redundant servers, which means that these systems are duplicated, and in the event of a malfunction, one server will fail over to other.

Availibilty

A company's network infrastructure uses load balancers which will distribute the "load" of tasks such as file requests and data routing to a variety of servers, thereby ensuring that no single device is overburdened.

Availibilty

A hacker launched a DDoS attack which flooded a website with unwanted traffic from a number of computers and took the site offline.

Availibilty


Related study sets

Basic Sales Qualification Questions

View Set

chapter 10/11 final exam. busn225

View Set

Capstone Chap.10 Business Ethics, Social Responsibility, and Environmental Sustainability, Capstone Chap.11 Global and International Issues

View Set

Exam 2: Chapter 12 (The Cell Cycle)

View Set