Threats to confidentiality, integrity, and availabili
There are many different threats to the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all these risks.
Create a 1-to 2 -page table, in Microsoft® Word, listing a minimum of 6 threats using the column headers and details below:
Threat – List the threat.
Threat to Type of Data (data-at-rest,data-in-transit, or processing) – Identify the type.
Confidentiality/Integrity/Availability– Identify whether some or all are affected by labelling: C, I, and/orA.
Mitigation Suggestion – Describe a mitigation plan in 2-3 sentences.
Example:
Threat: Password Compromise
Threat to Type of Data: Data-At-Rest
Confidentiality/Integrity/Availability: C & I
Mitigation: Employ a strong password that is changed at regular intervals. Do not share your password or write it down on sticky notes on your desk.

How it Works

1
It only takes a couple of minutes to fill in your details, select the type of paper you need (essay, term paper, etc.), give us all necessary information regarding your assignment.


2
Once we receive your request, one of our customer support representatives will contact you within 24 hours with more specific information about how much it'll cost for this particular project.


3
After receiving payment confirmation via PayPal or credit card – we begin working on your detailed outline, which is based on the requirements given by yourself upon ordering.


4
Once approved, your order is complete and will be emailed directly to the email address provided before payment was made!