1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kay [80]
2 years ago
10

Suggest any three security requirements that any organisation must implement and explain how a framework can be used for securit

y and control of its data
Computers and Technology
1 answer:
skad [1K]2 years ago
7 0

The security implementation by any organizations are:

  • Backup the computer systems.

  • The use of antivirus.

  • Avoidance of suspicious website.

<h3>How is data security performed?</h3>

In an organisation, the data is protected to avoid data and security breaches along with other treats through the following:

  • Backup the computer systems: Some computer viruses that would require the removal of organisations' data. Without a backup, there would be no way to recover the lost data.

  • The use of antivirus: This is an anti-virus software that helps to protect the computer system again malware.

  • Avoidance of suspicious website: The opening of suspicious website should be avoided while implementing security in an organisation.

Learn more about data security here:

brainly.com/question/25720881

#SPJ1

You might be interested in
Why should the ISO be adjusted when taking a picture of a child blowing out candles in a darkened room?
stepan [7]

Answer:

yes

Explanation:

if any extreme light is flashed at the eyes a red eye would really ruin the picture

3 0
3 years ago
A folder can contain only files? A. True B.False
choli [55]
That statement is true.
In recent technologies, folder can contain whatever users want it to contain.  Not only, that, users could also arrange the maximum size of files that a folder could contain or the visibility status of each items that will be placed on the shoulder in case they need some sort of privacy for his/her files

8 0
3 years ago
Read 2 more answers
Which of these colors is most likely to be outside the CMYK gamut?
erma4kov [3.2K]
CMYK does not include a white color because it is assumed that it will be printed on a white paper and depending on the percentage of each color that is used, the white from the paper will be used to fill the space, therefore making the shades appear lighter. If it's something that will only be seen digitally, use RGB.
3 0
3 years ago
During slide show mode, hitting the B key will do which of these things?
tia_tia [17]

Answer:

move to the first page?

6 0
4 years ago
Read 2 more answers
_____ is a valid URL, or internet address. In this URL, ______ indicates the protocol.
Natalija [7]

Answer:

1. B.http://www.example.com

2. A. http

Explanation:

7 0
3 years ago
Other questions:
  • In three or four sentences, describe how a person buys and sells stock.
    6·2 answers
  • Assume that aList is a valid ArrayList containing the following:
    8·1 answer
  • Which quality of service (QoS) mechanism provided by the network does real-time transport protocol (RTP) rely on to guarantee a
    13·1 answer
  • Which of the following advertisements is most likely a legitimate job advertisement?
    14·2 answers
  • _is a computer network created for an individual person
    10·1 answer
  • you are teaching a class about basic camera functions like power, basic date/time, menu navigation, and how to properly attach a
    9·1 answer
  • Carbohydrates are a huge source of
    7·2 answers
  • ______________ memory is a small, high-speed, high-cost memory that servers as a buffer for frequently accessed data
    9·2 answers
  • State five differences between selecting and highlighting ​
    7·1 answer
  • Fast i need now ill give anything
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!