Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Neighborhood cellular white settlement texas

11/12/2021 Client: muhammad11 Deadline: 2 Day

POST – 1 please provide one reply to this post.

1.Do you think nonrepudiation falls under one of the tenets of the C-I-A triad (confidentiality, integrity, and availability)? Why or why not?

A security model of any organization involves three main attributes called C-I-A triad which stands for confidentiality, integrity and availability. These three tenets of information security guides information security policies of an organization. One or more of these principals are violated when any kind of cyber-attack, data leak or data breach happens in an organization. Confidentiality assures that only authorized personnel or party can access an organization’s sensitive information or database thus keeping unauthorized access at bay. Integrity ensures that data do not get corrupted or tampered with and remains accurate, consistent and authentic over its lifecycle. Similarly, availability ensures that the data is available and ready whenever it is required. This is ensured by keeping all hardware working, minimizing downtime in case of unavoidable events by keeping backups and redundant devices, maintaining network etc. Now let’s come to nonrepudiation, Non-repudiation refers to a situation where a statement's author cannot successfully dispute its authorship or the validity of an associated contract. The term is often seen in a legal setting when the authenticity of a signature is being challenged. In such an instance, the authenticity is being "repudiated" (Zhou, 2001). So, I think nonrepudiation falls under integrity category of C-I-A triad because non repudiation confirms that a message was send by its original sender and that its origin cannot be questioned with. This means that the message reaches the receiver untampered and in its authentic form which is what integrity also ensures.

2. Is the C-I-A triad adequate when selecting controls for a Windows system? Why or why not?

In my opinion C-I-A triad although speaks a lot about information protection is not adequate when selecting controls for a Windows system. This is because C-I-A triad is entirely concerned with information only and do not talk anything about accountability and responsibility. Another thing is C-I-A model do not relate anything about the interdependence between its triads. For example, increasing confidentiality and integrity may result in compromise of availability (Solomon, 2021). This means a less available system can have more confidentiality and integrity than easily available system. Although availability ensures that we get easy access to the resource when needed but this does not mean that an unauthorized use of hardware is not possible. Also, the C-I-A triad do not talk anything about authentication which involves establishing the identity of a user.

References

Solomon, M. G. (2021). Security Strategies in Windows Platforms and Applications (3rd ed.). Burlington, MA: Jones & Bartlett Learning.

Zhou, J. (2001). Non-repudiation in Electronic Commerce

POST – 2 please provide one reply to this post.

Nonrepudiation falls under one of the C-I-A triad’s tenets.Non-repudiation refers to the assurance that an individual cannot deny anything. Nonrepudiation typically is the ability of ensuring that a party to a certain communication or contract cannot deny the originality or authenticity of their personal signature on a given document or sharing a message or information that they originated("The CIA Triad: Confidentiality, Integrity, Availability - Panmore Institute", 2020).Non-repudiation needs the creation of various artifacts that could be used in disputing the claims of an organization, which denies being the originator of a certain communication or action. Suchartifactscontain a given identity, whose authenticity is the tangible evidence that connects an identified party to a certain action or communication. Digital signatures ensure data integrity by guaranteeing the identity of the sender. Digitalsignatures enforce the identity of a sender to ensure that the sender cannot deny the act later. Timestamps possess the date and time when the document was developed or composed in generating an evidence of,the availability of the document at that particular time.

C-I-A triad adequate while selecting controls for a given system of Windows. The CIA’s integrity can be verified by the use of a hashing algorithm. A hash of the message is essential generated and attached to the end of communication or message(Spiceworks, 2020). The person receiving the message calculates the message’s hash and compares it with the received hash. In case anything changed during the transit process, the hashes cannot match. The hashes used in storing data are completely different from hashes of cryptographic. Before the release of Windows NT, the operating systems of Microsoft were using the LANMAN protocol for purposes of authentication. This was replaced by the NTLM after Windows NT was released.

References

Spiceworks, I. (2020). The CIA Triad and Its Real-World Application. Retrieved 20 June 2020, from https://community.spiceworks.com/topic/2205579-the-cia-triad-and-its-real-world-application

The CIA Triad: Confidentiality, Integrity, Availability - Panmore Institute. (2020). Retrieved 20 June 2020, from http://panmore.com/the-cia-triad-confidentiality-integrity-availability

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Pro Writer
Essay & Assignment Help
Instant Assignments
Study Master
Engineering Help
Math Specialist
Writer Writer Name Offer Chat
Pro Writer

ONLINE

Pro Writer

I will provide you with the well organized and well research papers from different primary and secondary sources will write the content that will support your points.

$70 Chat With Writer
Essay & Assignment Help

ONLINE

Essay & Assignment Help

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$72 Chat With Writer
Instant Assignments

ONLINE

Instant Assignments

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$67 Chat With Writer
Study Master

ONLINE

Study Master

I am an academic and research writer with having an MBA degree in business and finance. I have written many business reports on several topics and am well aware of all academic referencing styles.

$66 Chat With Writer
Engineering Help

ONLINE

Engineering Help

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$75 Chat With Writer
Math Specialist

ONLINE

Math Specialist

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$79 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Sir william hudson memorial centre ltd - CORRECT LITERATURE REPORT !!!!! ( PROFESSOR ADJUSTMENTS) - Ocr nationals ict level 2 - Montresor kills fortunato by __________ - French review and practice - 3.1 - Ecce romani ii chapter 35 translation - Computer peripherals input output and storage technologies - Studynet1 herts ac uk studynet - Advanced diploma in mechatronics & industrial automation - 61mm top hat battens - Biss pdf - Mount baw baw live cam - Personal financial planning test bank - Optimum custhelp app answers list 136 138 search router - Reconquest of spain worksheet answers - How to write arabic numbers 1 20 - Cul de sac resonance - 521 If you have not already commented on at least four peer presentations in the discussion board, please do so before Sunday, 11:59 p.m. (Pacific time). - The murder city devils in san francisco slim's december 31 - 10 pages - Artificial Intelligence (AI) and Business - IT Course from MBA Program - quality work needed and must follow the instructions - Pay council tax wakefield - Lego group strategic analysis review - York u refund table - Due Mon-9/28 @ 11PM (EST) 2100 Words APA format with 4 references - Southwestern university's food service case study - A marketing mix typically involves - Failing health that results from a long standing dietary intake - Crime scene that is the original location of a crime - Coates hire barossa valley - Youth Sports - Paint net svg files - Work effectively in a service environment - Developing a Needs Statement - Roger thrower god is my redeemer - 2 pages - Manrose indoor tumble dryer kit instructions - Article on disaster management in 150 words - Experiment 1 observation of mitosis in a plant cell - What are the three most fundamental concepts of redistricting - John kotter eight steps to successful change - Problem 5 3a perpetual alternative cost flows lo p1 - How do you make a genogram - Theo 104 quiz 1 course hero - What is a directive leader - Wgu c361 task 1 2018 - Phd in petroleum geology - Buddy has a hypothesis - Thermal analysis of disc brake ppt - Research Paper - How many lightning strikes per second - SERVANT LEADERSHIP PROJECT - Research Project Step 2: Problem Identification - Name the following compound according to substitutive iupac nomenclature - Opm administrative analysis grade evaluation guide - Idea fimit dea capital - Dr john kotter 8 steps - Building permit application nt - A chorus line character list - Slp 3 537 - Residential summer string camp - History Discussion - Jane elliott brown eyes blue eyes experiment - Sarbance - All quiet on the western front excerpt - Cooper's ethical decision making model summary - Week 10-1 apa format 2 paragraphs per question - Mobile phone should not be banned in school - Is 11/14 a terminating decimal - Cost reduction pressures can be particularly intense in industries producing - Duty of trust and confidence cipd - Strathaird primary school uniform - Iv flow rate formula - A well designed activity based costing system starts with - Chase bank in naperville rt 59 - OPS/571T WEEK 6 DISCUSSION - Marketing Strategy and consumer behavior Paper 3 - Pressure temperature relationship in gases lab report - 115vac ped power supply - Mba bath business school - Characteristics of an agile mis infrastructure - Uniformly accelerated linear motion conclusion - Cybercrime - Microbiology a systems approach 5th edition access code - Convert 309.28 to icd 10 - Tesco's international growth strategy - What is assignment in lesson plan - Utilitarianism and Deontology Assignment - Evidence based practice - Point cook coastal park - Nursing - Kpmg urgent medical device case answers - Prejudice against immigrants was known as ___ - Multi step flow theory of communication - Phd interview questions and answers in information technology - The usual starting point for a master budget is - Profile of a Sacred Space - Hitachi end of life - Nw african nation crossword - What happened to jonas' memories in chapter 21