1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erik [133]
2 years ago
7

Research the design basis threat (DBT) in terms of Cybersecurity for an organization of your choice. Discuss what the Cybersecur

ity objectives should be for that organization and what those objectives should address?
Computers and Technology
1 answer:
tiny-mole [99]2 years ago
3 0

A Design Basis Threat (DBT) is known to be a characteristics of any given or potential insider and also those of external adversaries, that may try to have or gain unauthorized removal or sabotage, against a physical protection system that was set up designed and evaluated.

<h3>What are Cybersecurity objectives?</h3>

Cybersecurity aims are:

  • To protect computer system,
  • To protect networks,
  • To protect software programs from such cyber attacks.

Note that a lot of digital attacks are targeted at accessing, changing, or deleting sensitive information as well as others.

Learn more about IT from

brainly.com/question/1276995

#SPJ1

You might be interested in
You are given a class named Clock that has one int instance variable called hours.
Vlad [161]

Answer:

public Clock(int hours) {

       this.hours = hours;

   }

Explanation:

In Java programming language, Constructors are special methods that are called to initialize the variables of a class when a new object of the class is created with the new keyword. Consider the complete code for the class below;

<em>public class Clock {</em>

<em>    private int hours;</em>

<em>    public Clock(int hours) {</em>

<em>        this.hours = hours;</em>

<em>    }</em>

<em>}</em>

In this example above,  an object of this class can created with this statement Clock myclock = new Clock(6); This is a call to the constructor and passes a parameter (6) for hours

7 0
3 years ago
A blog is best defined as: a web site primarily involved in tracking people's behavior on the Internet. a web site that typicall
Igoryamba

Answer:

a reverse chronological journaling site.

Explanation:

A blog originally known as weblog, is an online journal containing informational or educational content, it usually displays information from the last added item ( that is why it is called reverse chronological journaling site), it can be personal or for a corporate entity for promoting brand identity.

5 0
3 years ago
The area of a parallelogram is 18 square units.one side of the parallelogram is 24 units long.The other side is 6 unit long. whi
taurus [48]

Answer:

Height = \frac{3}{4}\ unit

Height = 3\ units

Explanation:

Given

Shape: Parallelogram

Area = 18 unit^2

Side\ 1 = 24  units

Side\ 2 = 6 units

Required

Determine possible heights of the parallelogram

Area of parallelogram is:

Area = Base * Height

Make Height the subject of formula

Height = \frac{Area}{Base}

When Base = 24 units;

Height = \frac{18}{24}

Height = \frac{3}{4}\ unit

When Base = 6 units;

Height = \frac{18}{6}

Height = 3\ units

8 0
3 years ago
The proxy statement issued by a corporation is a requirement of: a. The Securities &amp; Exchange Commission (SEC) b. The Financ
8090 [49]

Answer:

The answer is "Option a".

Explanation:

A proxy statement is a file, that provides security and exchange in data commission, that is a powerful tool for holders, as it tells employees, that together with the instructions to do, and other choices, which could be listed as follows are wrong:

  • In option b, It is used in accounting guidelines, that's why it is wrong.
  • In option c, It requires, that's why it is incorrect.
  • In option d, It is wrong because it doesn't committee.
8 0
3 years ago
A file named numbers.txt contains an unknown number of lines, each consisting of a single positive integer. Write some code that
Reptile [31]

Answer:

  1. with(open("numbers.txt")) as file:
  2.    data = file.readlines()  
  3.    runsum = 0
  4.    largest = 0
  5.    
  6.    for x in data:
  7.        if(int(x) > largest):
  8.            largest = int(x)
  9.            runsum += largest  
  10.    
  11.    print(runsum)

Explanation:

The solution code is written in Python 3.

Firstly, open a filestream for numbers.txt (Line 1) and then use readlines method to get every row of data from the text files (Line 2).

Create a variable runsum to hold the running sum of number bigger than the maximum value read up to that iteration in a for loop (Line 3).

Use a for loop to traverse through the read data and then check if the current row of integer is bigger than the maximum value up to that point, set the current integer to largest variable and then add the largest to runsum (Line 6 - 9).

At last display the runsum to console terminal (Line 11).

8 0
4 years ago
Other questions:
  • A(n) _____ is a fake online persona created to promote a particular point of view, often in praise of a firm, product, or indivi
    15·1 answer
  • How to make the heart symbol in photoshop
    13·2 answers
  • Cuales Son las características de la máquina analítica de Carlos Babbage ?
    11·1 answer
  • "Save" or "save as" can be used interchangeably and have no unique features.<br> True<br> False
    12·2 answers
  • Where can i watch bnha movie 2 online for free, with no sign up or pay?
    6·2 answers
  • Please help on both of these questions will give brainliest<br> !!
    9·2 answers
  • What is Microsoft marketing ?
    10·1 answer
  • If you want the input gear to spin in the same direction as the output gear you must use a _______ gear.
    13·1 answer
  • [If you were the queen of the world .... What would you change ?]
    14·1 answer
  • Prior to the 1996 NEC, ____ receptacles and cords were permitted. However, now it is mandatory that a separate equipment groundi
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!