1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-Dominant- [34]
2 years ago
9

You are hired as a security advisor to the software development team at ABC corporation. The team aims to develop a new electron

ic commerce platform. Use a table to identify the possible abuse cases and security requirements and necessary at the requirements phase of the development of the proposed software
Computers and Technology
1 answer:
Sergeeva-Olga [200]2 years ago
7 0

Answer:

✓ The best and most correct answer among the choices provided by the question is the second choice. Recent advancements in productivity software technology

Explanation:

Productivity software has been used for a number of years. Recent advancements in productivity software technology have made _____ among multiple users all over th…

✓ The best and most correct answer among the choices provided by the question is the second choice. Recent advancements in productivity software techn…

See more

You might be interested in
Which source would provide the best way to find valid information about climate change
igor_vitrenko [27]
Primary sources would be best
4 0
2 years ago
How can knowing internal and external parts of computer help me
mafiozo [28]
Going over parts of a computer and how it functions will help you understand all the vital components that make up a computer.
8 0
3 years ago
_________ is the most popular high-level Java API in Hadoop Ecosystem. Cascading Scalding Cascalog None of the options
pochemuha

Answer:

The answer is Cascading

8 0
2 years ago
The Company management has asked that you compare the OSSTMM and the PTES to determine which methodology to select for internal
Sonbull [250]

Answer:

The basic comaprism of OSSTMN and PTES includes the following: OSSTMN is more theoretical, security assessment methodology, and Metrics based why PTES is technology oriented, penetration testing methodology ,  extended analysis of all stages

Explanation:

Solution

Penetration testing has several methodologies which include :OSSTMM and PTES  

The comparison between OSSTMM and PTES is stated as follows:

OSSTMM:                                                

Security assessment methodology

More Theoretical  

Metrics based

PTES :

Technology oriented

Penetration testing methodology

Extended analysis of all stages

Now,

There are 7 stages which is used to define PTES for penetration testing.(Penetration Testing Execution Standard)

  • Pre-engagement Interactions
  • Intelligence Gathering
  • Threat Modeling
  • Vulnerability Analysis
  • Exploitation
  • Post Exploitation
  • Reporting

Now,

The OSSTMM is used to obtain security metrics and performing penetration testing .The OSSTMM provides transparency to those who have inadequate security policies and configurations.

The OSSTMM includes the entire risk assessment process starting from requirement analysis to report creation.

Six areas are covered by OSSTMM which are:

  • Information security
  • Process security
  • Internet technology security
  • Communications security
  • Wireless security
  • Physical security
7 0
3 years ago
Gary says, "Ports are where data enter a network before reaching a gateway. The data travel via transmission
m_a_m_a [10]

The correct explanation of why Gary is wrong is that Ports are where connectors attach to destinations, not where data enter the network.

<h3>What is a port?</h3>

A port is physical part of the computer system where the external devices are connected using cables.

Therefore, it serves as an interface between the motherboard and an external device of the computer.

From Gary statement about ports, he is wrong because, Ports are where connectors attach to destinations, not where data enter the network.

Learn more about ports here:

brainly.com/question/4804932

#SPJ1

3 0
2 years ago
Other questions:
  • g The reciprocal Fibonacci constant ψ is defined by the infinite sum: ψ=∑n=1 [infinity] 1 Fn Where Fn are the Fibonacci numbers
    7·1 answer
  • What is Software? Write the functions of Software?​
    11·1 answer
  • Which business filing process puts documents or data in the order by date? a. Linear
    7·1 answer
  • Given two double variables, best value and second best value, write some code that swaps their values. declare any additional va
    13·1 answer
  • Which of the following is not an advantage of using asynchronous data transmission
    15·1 answer
  • Write the function mystrchr(). the function has two parameters: a const char * s pointing to the first character in a c-style st
    14·1 answer
  • Consider a channel that can lose packets but has a maximum delay that is known. Modify Protocol rdt2.1 to include sender timeout
    11·1 answer
  • How many positions there are in the media and design department?
    14·2 answers
  • 1. provide at least 3 properties and 3 methods of the object computer.
    8·1 answer
  • Microsoft Word, Google Chrome, and Windows Media Player are examples of
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!