WGU C845 INFORMATION SYSTEMS SECURITY VUN1 - TASK 3 (2026): COMPLETE A+ GUIDE TO EVALUATING & DEFENDING DATA SECURITY AND SYSTEM OPERATIONSCore Framework You MUST Use (Non-Negotiable) CIA Triad Every answer should clearly defend at least one of these: Principle Meaning Confidentiality Prevent unauthorized access Integrity Prevent unauthorized modification Availability Ensure systems/data are accessible If evaluators cant clearly see CIA revision request. Section-by-Section A+ Breakdown A. Evaluate Data Security Risks What Evaluators Want Clear identification of threats Explanation of vulnerabilities Connection to business impact Safe, Pass-Guaranteed Risk Examples You can always use these: Unauthorized access Malware/ransomware Phishing attacks Insider threats Data breaches System downtime Weak authentication Unpatched systems A+ Evaluation Formula (Use This Every Time)A security risk exists when a threat exploits a vulnerability, resulting in potential harm to data or system operations. Sample High-Scoring Language Unauthorized access poses a significant data security risk because weak authentication controls may allow attackers to gain access to sensitive information, compromising confidentiality and potentially system integrity. B. Defend Data Security Controls What This Section Is About You must defend why controls are appropriatenot just name them. Safe Controls WGU Loves Use at least administrative, technical, and physical. Control Type Examples Administrative Policies, training,