Question: Please match the security controls from left into Confidentiality, Integrity, and Availability (CIA Triad). (6 mark) Example: Encryption Log Files Password Anti-Virus VPN Hash Algorithms
Please match the security controls from left into Confidentiality, Integrity, and Availability (CIA Triad). (6 mark)
Example:
Encryption
Log Files
Password
Anti-Virus
VPN
Hash Algorithms
Backup Files
Confidentiality
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
