Where does authenticity fit into the CIA Triad? – security.stackexchange.com

Consider a chat application where an attacker is able to send messages in any user's name. This obviously violates the message's authenticity. But what aspect of CIA would be violated? Integrity ...

from Hot Questions - Stack Exchange OnStackOverflow
via Blogspot

Share this

Artikel Terkait

0 Comment to "Where does authenticity fit into the CIA Triad? – security.stackexchange.com"