Loading [MathJax]/extensions/mml2jax.js
Skip to main content
Library homepage
 

Text Color

Text Size

 

Margin Size

 

Font Type

Enable Dyslexic Font
Engineering LibreTexts

Search

  • Filter Results
  • Location
  • Classification
    • Article type
    • Author
    • Set as Cover Page of Book
    • License
    • Show TOC
    • Transcluded
    • OER program or Publisher
    • Autonumber Section Headings
    • License Version
    • Print CSS
  • Include attachments
Searching in
About 4 results
  • https://eng.libretexts.org/Courses/Delta_College/Introduction_to_Information_Systems/06%3A_Information_Systems_-_Security/6.02%3A_CIA
    Integrity can also be lost unintentionally, such as when a computer power surge corrupts a file or someone authorized to make a change accidentally deletes a file or enters incorrect information. For ...Integrity can also be lost unintentionally, such as when a computer power surge corrupts a file or someone authorized to make a change accidentally deletes a file or enters incorrect information. For example, a stock trader needs information to be available immediately, while a sales person may be happy to get sales numbers for the day in a report the next morning.
  • https://eng.libretexts.org/Courses/Delta_College/Master_CS11_POCR/08%3A_Information_Systems_-_Security/8.02%3A_CIA
    Cybercrime can be categorized based on whether a network or computer technology is the target of the crime, or where the technology is used to commit a crime. In the e-mail the user is asked to click ...Cybercrime can be categorized based on whether a network or computer technology is the target of the crime, or where the technology is used to commit a crime. In the e-mail the user is asked to click a link and log in to a website that mimics the genuine website, then enter their ID and password. Another crime that is committed with the use of a computer is software piracy, which is the illegal copying and distribution or use of software.
  • https://eng.libretexts.org/Courses/Prince_Georges_Community_College/INT_1010%3A_Concepts_in_Computing/12%3A_Information_Systems_for_Business/12.06%3A_Information_Systems_Security/12.6.02%3A_CIA
    Integrity can also be lost unintentionally, such as when a computer power surge corrupts a file or someone authorized to make a change accidentally deletes a file or enters incorrect information. For ...Integrity can also be lost unintentionally, such as when a computer power surge corrupts a file or someone authorized to make a change accidentally deletes a file or enters incorrect information. For example, a stock trader needs information to be available immediately, while a sales person may be happy to get sales numbers for the day in a report the next morning.
  • https://eng.libretexts.org/Courses/Prince_Georges_Community_College/INT_2840%3A_Systems_Analysis_and_Project_Management/08%3A_Information_Systems_Security/8.01%3A_CIA
    Integrity can also be lost unintentionally, such as when a computer power surge corrupts a file or someone authorized to make a change accidentally deletes a file or enters incorrect information. For ...Integrity can also be lost unintentionally, such as when a computer power surge corrupts a file or someone authorized to make a change accidentally deletes a file or enters incorrect information. For example, a stock trader needs information to be available immediately, while a sales person may be happy to get sales numbers for the day in a report the next morning.

Support Center

How can we help?