Alice sends an encrypted message to Bob but it is intercepted by Trudy. Trudy cannot read it so, in anger, she deletes it without allowing its delivery to Bob. Which precept of the CIA Triad would have been violated?
Answers
Alice sends an encrypted message to Bob but it is intercepted by Trudy. Trudy cannot read it so, in anger, she deletes it without allowing its delivery to Bob. Which precept of the CIA Triad would have been violated?
Explanation:
Information security has three fundamental principles: confidentiality, integrity and availability (CIA). These principles are used in different contexts, environments and applications.
For example in a bank, confidentiality is critical and is given more importance. In mission critical systems such as nuclear reactors, availability is more important.
Availability ensures that the authorized users of a system have continuous access to the information, applications and other resources of the network or system.
In the case above, Trudy breached availability by deleting the message
Answer: The answer will be availablity
Explanation: in cybersecurity the communication works on the CIA triad principle
'C' that stands for Confidentiality means keeping the data private , here trudy doesn't read the message so he doesn't violate 'C'
'I' that stands for Integrity means maintaining the data consistency and no unauthorized can change the data , here trudy doesn't modify the message so he doesn't violate 'I'
'A' that stands for Availablity means ensuring the availablity of the data , here trudy deletes the message and the data isn't available for BOB so he does violate 'A'