As the information technology (IT) team is starting to develop the Web application database, you notice that usernames and passwords are being created. You want to ensure that the IT team is familiar with the confidentiality, integrity, and availability (CIA) triangle as well as the authentication and authorization concept.
Complete the following for this assignment:
Describe the CIA triangle and the authentication and authorization concept.
What steps does IT team need to execute to ensure the security of the user accounts?
Why are these steps needed to maintain the security of the user accounts?
What happens in the real world when certain steps are not executed properly?
Need help with this assignment or a similar one? Place your order and leave the rest to our experts!