Question: Please match the security controls from left into Confidentiality, Integrity, and Availability (CIA Triad). (6 mark) Example: Encryption Log Files Password Anti-Virus VPN Hash Algorithms

Please match the security controls from left into Confidentiality, Integrity, and Availability (CIA Triad). (6 mark)

Example:

Encryption

Log Files

Password

Anti-Virus

VPN

Hash Algorithms

Backup Files

Confidentiality

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!