Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A. Describe the mitigation plan in 2 to 3 sentences in the column.
Threats to Confidentiality, Integrity, and Availability Consider yourself a network security specialist. As you try to secure the security posture of your environment, you realize that different threats can interfere with the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats may affect only 1 of these elements of security (such as confidentiality […]