0% found this document useful (0 votes)
2 views

CS435_Assignment 2

The document is an assignment for CS435 by Amna Yaseen, focusing on Cloud Sim as a simulation environment for testing in Cloud computing. It also discusses the CIAAA Triad, which includes confidentiality, integrity, availability, authentication, and authorization as key concepts in Information Security. Each concept is briefly defined, emphasizing their importance in protecting sensitive information and ensuring secure access.

Uploaded by

narmeenshahid388
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

CS435_Assignment 2

The document is an assignment for CS435 by Amna Yaseen, focusing on Cloud Sim as a simulation environment for testing in Cloud computing. It also discusses the CIAAA Triad, which includes confidentiality, integrity, availability, authentication, and authorization as key concepts in Information Security. Each concept is briefly defined, emphasizing their importance in protecting sensitive information and ensuring secure access.

Uploaded by

narmeenshahid388
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

CS435

Assignment No: 02
Name: Amna Yaseen
VU ID: BC210207352
Assignment

Question No. 1 Total Marks: 20

Cloud Sim is a simulation environment. It is more suitable for testing various new and updated procedures and
hypothesizes related to Cloud computing.

ANSWER:

Question No. 2 Total Marks: 10

Confidentiality, integrity, availability, authentication, and authorization are five fundamental concepts in
Information Security. They are collectively referred to as the CIAAA Triad.
Select the appropriate option from CIAAA.

Description Correct Option

Refers to the protection and preservation of Confidentiality


sensitive information from unauthorized access,
use, or disclosure.

Refers to the quality of being honest, upright, and Integrity


adhering to strong moral principles and values. It
encompasses having a strong sense of ethics,
truthfulness, and reliability in one's actions,
words, and character.

Refers to the state or condition of being Availability


accessible, present, or ready for use.
The process of verifying the identity or validity of Authentication
a user, system, or entity. It ensures that the
claimed identity or credentials are accurate and
authorized for access or interaction.

The process of granting or restricting access rights Authorization


and permissions to users or entities based on
their authenticated identity and specified
privileges.

You might also like