I’m trying to study for my Computer Science course and I need some help to understand this question.
Overview: In this activity, you will demonstrate how Fundamental Security Design Principles can be employed to achieve the basic security objectives of confidentiality, integrity, and availability (CIA triad).
1. Read the article, “Employ Five Fundamental Principles to Produce a SOLID, Secure Network,” linked in the Module One Reading and Resources section of your course. You should specifically refer to key information in the tables that reference topics from the CIA triad. 2. Create a simple table that identifies at least 10 of the topics listed in Table 2 in the article. In your table, categorize each topic according to the CIA triad, justify your category choice, and provide citations for sources you used for support. Use the table below as a model for how your finished table should look. (Do not reuse the examples below in your submission.)