protection skill

Determine the type of data threatened (data-at-rest, data-in-transit, or processing) for that threat. Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A.

Wk 1 – Apply: Summative Assessment: Threats to Confidentiality, Integrity, and Availability Consider yourself a network security specialist. As you try to secure the security posture of your environment, you realize that different threats can interfere with the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats may affect only 1 of these […]

Scroll to top