69.1k views
3 votes
Vulnerabilities and risks are evaluated based on their threats against which of the following?This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Data usefulness B Due care C Extent of liability D One or more of the CIA Triad principles

User Cherif
by
5.3k points

1 Answer

3 votes

Answer:

The answer is "Option D".

Explanation:

The CIA Trilogue is a model for interpretation of security policies within an organization that is designed for direct confidentiality, integrity, and availability. This design is also sometimes related to it as the AIC triad, which avoids overlap with the central intelligence community.

  • In option A, it is used to process and analyze the data, that's why it is wrong.
  • In option B, It is wrong because it tracks the measurement of financial assets, determines risks in an organization, and focus on areas for further study.
  • In option C, It is wrong because it is regulated by contracts.
User Drozdzynski
by
4.8k points