Describe the cia triangle and the authentication and


Assignment

As the information technology (IT) team is starting to develop the Web application database, you notice that usernames and passwords are being created. You want to ensure that the IT team is familiar with the confidentiality, integrity, and availability (CIA) triangle as well as the authentication and authorization concept.

Complete the following for this assignment:

• Describe the CIA triangle and the authentication and authorization concept.
• What steps does IT team need to execute to ensure the security of the user accounts?
• Why are these steps needed to maintain the security of the user accounts?
• What happens in the real world when certain steps are not executed properly?

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Describe the cia triangle and the authentication and
Reference No:- TGS02477690

Now Priced at $30 (50% Discount)

Recommended (98%)

Rated (4.3/5)