Foundations of security

Assignment Content There are many different threats to the confidentiality, integrity, and availability of data-at-rest. Some threats affect one of these security risks (like confidentiality only), and some threats affect more than one or even all of these risks. Create a 1-page table in Microsoft® Word or Excel® listing a minimum of five threats using the column headers Threat to Data-at-Rest, Confidentiality/Integrity/Availability, and Suggestion on Countering the Threat. In the Confidentiality/Integrity/Availability column, identify whether each of the following are affected: Confidentiality Integrity Availability Some or all of the three (Confidentiality, Integrity, and/or Availability) Include suggestions on how to counter each threat listed. Place your list in the 3 columns of a table in a Microsoft® Word or Excel® document. Submit your assignment. Resources

Sample Solution