There are many different threats to the confidentiality, integrity, and availability of data-at-rest. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all of these risks. Create a 1-page table in Microsoft® Word or Excel® listing a minimum of five threats using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat. In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected:
•Confidentiality
•Integrity
•Availability
•Some or all of the three (Confidentiality, Integrity, and/or Availability) Include suggestions on how to counter each threat listed. Place your list in the 3 columns of a table in a Microsoft® Word or Excel® document. Submit your assignment using the Assignment Files tab.vicky be my main main.love
Question 2
- Locate an article pertaining to recent cyber security incident impacting electronic commerce at a specific firm published within the last three months.
- Include a link to the article.
- Write a summary of the incident.
- Who was impacted?
- What technical vulnerability (if any) made this attack possible?
- How did human error play a role?
- What was the financial impact of this incident?
- What could have been done to prevent this incident?
- How was electronic commerce impacted?
- Run their website through the SSL Server Test (Powered by Qualys SSL Labs) – what were the results? Name one way they could improve their score.
- 2 – 3 pages.
Do you need help with this assignment or any other? We got you! Place your order and leave the rest to our experts.