logo

Security Principles

   

Added on  2023-04-03

8 Pages1397 Words436 Views
Running head: SECURITY PRINCIPLES
SECURITY PRINCIPLES
Name of the Student
Name of the University
Author Note:

1SECURITY PRINCIPLES
Table of Contents
Answer to Question 1..........................................................................................................2
Answer to Question 2..........................................................................................................2
Answer to Question 3..........................................................................................................3
Answer to Question 4..........................................................................................................4
Answer to Question 5..........................................................................................................4
References............................................................................................................................6

2SECURITY PRINCIPLES
Answer to Question 1
Confidentiality, integrity and Availability are known to be CIA trio which is known to be
building block of information security. Hacked Australia defence lost around 30 GB of
commercially available documents for projects like Joint Strike program and complete design of
Australian ship (Crozier et al., 2019). Any kind of attack will ultimately lead to compromising
with all three given components. Depending on the components which are compromised can
easily result in proper security control which has been designed properly.
Confidentiality is all about understanding the fact that something is secret and not
supposed to be completely disclosed to any of the unintended people. Australian government did
not disclose the complete hack on Tuesday and came up with far scant details (Gupta, Agrawal
and Yamaguchi, 2016). Confidentiality mainly aims to ensure the fact all the sensitive
information is accessed by authorized person (Buczak and Guven 2015). Integrity highlights the
fact that all the transmitted data given by sender is exactly received by receiver and there is no
kind of alternation in it. Availability ensures that information is available to only the authorized
parties.
This particular attack on the three important aspects of information security like
confidentiality, Integrity and availability (O’HANLON 2019). In attack, the hacker stole some of
the detail information about the submarine killer plane. The whole attack is being carried out by
either advanced persistent threat or even national state group.
Answer to Question 2
In this attack, some of the vital and sensitive about the Australian joint fire strike fighter
program were stolen. Having a proper idea behind the targeted attack is very much vital as it

End of preview

Want to access all the pages? Upload your documents or become a member.