Threats to confideliality,intergrity,and availabilty | Computer Science homework help

Create a minimum 1-page table in Microsoft® Word or Word Compatible identifying a minimum of 6 threats, using the column headers and details below:

Column Headers 

  1. Threat 
  2. Threat to Type of Data 
  3. Confidentiality/Integrity/Availability 
  4. Mitigation Suggestion 

Details Within Your Table 

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now
  1. Identify relevant threats. List 1 per column. 
  2. Determine the type of data threatened (data-at-rest, data-in-transit, or processing) in the column. 
  3. Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A in the column. 
  4. Describe the mitigation plan in 2 to 3 sentences in the column. 

Example Table 

Example Table

Include a short paragraph that highlights 2 access control techniques or policies that enforce security. 

Cite at least 2 resources to support your assignment. 

Format your assignment according to APA guidelines.

Review Rubric to assure all requirements are met.