100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Otro

C845 INFORMATION SYSTEMS SECURITY: CH.1

Puntuación
-
Vendido
-
Páginas
6
Subido en
12-01-2026
Escrito en
2025/2026

C845 INFORMATION SYSTEMS SECURITY: CH.1

Institución
C845
Grado
C845









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
C845
Grado
C845

Información del documento

Subido en
12 de enero de 2026
Número de páginas
6
Escrito en
2025/2026
Tipo
Otro
Personaje
Desconocido

Temas

Vista previa del contenido

C845 INFORMATION SYSTEMS SECURITY: CH.1


Confidentiality - Answers -Limits are placed on who is allowed to view the information,
including copying it to another form.

Integrity - Answers -The information stays complete and correct when retrieved,
displayed, or acted upon.

Availability - Answers -The information is presented to the user in a timely manner
when required and in a form and format that meets the user's needs.

Authenticity - Answers -Only previously approved, known, and trusted users or
processes have been able to create, modify, move, or copy the information.

Utility - Answers -The content of the information, its form and content, and its
presentation or delivery to the user meet the user's needs.

Possesion or Control - Answers -The information is legally owned or held by a known,
authorized user, such that the user has authority to exert control over its use, access,
modification, or movement.

Safety - Answers -The system and its information, by design, do not cause
unauthorized hard or damage to others, their property, or their lives.

Privacy - Answers -Information that attests to or relates to the identity of a person, or
links specific activities to that identity, but must me protected from being accessed,
viewed, copied, modified, or otherwise used by unauthorized persons or systems.

Nonrepudiation - Answers -Users who created, used, viewed, or accessed the
information, or shared it with others, cannot later deny that they did so.

Transparency - Answers -The information can be reviewed, audited, and made visible
or shared with competent authorities for regulatory, legal, or other processes that serve
the public good.

CIA Triad - Answers -Confidentiality, Integrity, and Availability.

CIANA - Answers -Combines Confidentiality, Integrity, Availability, Nonrepudiation, and
Authentication.

CIANA+PS - Answers -Expands CIANA to include Privacy and Safety.

, Parkerian Hexad - Answers -Includes confidentiality, integrity, availability, authenticity,
utility, and possession or control.

Intellectual Property - Answers -The ideas that we create and express in tangible,
explicit form; in creating them, we create an ownership interest.

Patent - Answers -Public Disclosure - Mandatory, Detailed. Monetized By - License to
use. Compromise by - failure to develop or monetize; failure to defend against
infringement.

Copyright - Answers -Public Disclosure - Published Works. Monetize by - Sell copies.
Compromise by - failure to defend.

Trademark - Answers -Public Disclosure - Logos, Signs, Product Stampings. Monetize
by - Create brand awareness in marketplace. Compromise by - failure to defend.

Trade Secret - Answers -Public Disclosure - Must me undisclosed. Monetize by - Sell
products and services based on its use; can be licensed. Compromise by - failure to
keep secret or defend.

The Security Triad - Answers -Confidentiality - Protects information and systems from
unauthorized use. Integrity - Protects information and systems from unauthorized
modification. Availability - ensures that information and systems for authorized users are
available when needed.

Hash Function - Answers -Hashes the contents of the file and is used to easily show if
the contents have been modified. This helps protect the integrity of a file.

Digital Certificate - Answers -Transmits public keys securely

Ways to protect Availability - Answers -Include redundant components, high availability,
fault tolerance, and keeping OS and applications updated and patched

Steganography - Answers -Hiding information within something else, such as an image

Ethics Code Canon 1 - Answers -Protect society, the common good, necessary public
trust and confidence, and the infrastructure

Ethics Code Canon 2 - Answers -Act honorably, honest, justly, responsibly, and legally

Ethics Code Canon 3 - Answers -Serve principals diligently and competently

Ethics Code Canon 4 - Answers -Advance the information security profession

Strong Identification and Authentication methods - Answers -Help with Accountability
$13.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Greaterheights Birkbeck, University of London
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
1126
Miembro desde
3 año
Número de seguidores
880
Documentos
18639
Última venta
1 día hace

4.1

218 reseñas

5
120
4
43
3
24
2
10
1
21

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes