subject

Read the article, “Employ Five Fundamental Principles to Produce a SOLID, Secure Network,” linked in the Module One Reading and Resources section of your course. You should specifically refer to key information in the tables that reference topics from the CIA triad. 2. Create a simple table that identifies at least 10 of the topics listed in Table 2 in the article. In your table, categorize each topic according to the CIA triad, justify your category choice, and provide citations for sources you used for support. Use the table below as a model for how your finished table should look. (Do not reuse the examples below in your submission.) Topic Category Justification Source In this column, include at least 10 of the topics from Table 2 in the article. In this column, identify which CIA triad category the topic falls into (confidentiality, integrity, or availability). In this column, justify your categorization using information from the provided article and any other resources that support your categorization. In this column, identify the resource you used for support. (Use either an APA-style citation or a direct link to the source.) Example: Configure your operating system to automatically download and install the latest updates. Example: Availability Example: If the system is not completely up to date, compatibility issues may make information on the system unavailable. Example: Weaving, H. (2003). Sentient computer programs: Why they persist. Vagaries of Perception, 16(7), 21–99. Note: In order for you to receive credit for this assignment, your finished table must contain at least 10 of the topics from Table 2.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 03:40
Hello my name is mihai and i need your : )i have to do a python project in computer science and i’m really busy with my mocks this period of time besides this i’m not good at coding so could someone pls pls pls sort me out ? i actually beg ; ))
Answers: 1
question
Computers and Technology, 22.06.2019 16:30
The most common battery cable terminal is a that provides a large surface contact area with the ability to tighten the terminal onto the battery post using a nut and bolt.
Answers: 2
question
Computers and Technology, 23.06.2019 13:30
Select the correct answer from each drop-down menu. which types of computer networks are bigger as well as smaller than a man? a man is a network of computers that covers an area bigger than a , but smaller than a .
Answers: 1
question
Computers and Technology, 23.06.2019 18:40
How does is make you feel when you're kind to others? what are some opportunities in your life to be more kind to your friends and loved ones? imagine a world where kindness has be outlawed. how would people act differently? would your day-to-day life change significantly? why or why not?
Answers: 2
You know the right answer?
Read the article, “Employ Five Fundamental Principles to Produce a SOLID, Secure Network,” linked in...
Questions
question
Mathematics, 14.04.2021 23:20
question
Mathematics, 14.04.2021 23:20
question
Mathematics, 14.04.2021 23:20
question
Mathematics, 14.04.2021 23:20
question
Mathematics, 14.04.2021 23:20
Questions on the website: 13722363