CMGT430 Enterprise Security Discussion: CIA Triad- University of Phoenix
The CIA triad is widely referenced in today's information security environments as a basic model for information security. There are three distinct legs to the CIA triad: confidentiality, integrity, and availability.
Expand on the the CIA component confidentiality. Include a baseline review of that specific attribute as well as challenges that might be encountered, including two potential security issues.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.