Answer:
The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.
The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.
A bar graph is a great graphical representation of disributiation of data
That would be (A) because an IDS stands for Intrusion detection system which means that when there’s malicious activity or policy violations. Any malicious activity or violation is typically reported either to an administrator.
* Main Electron a component- vacuum tube.
* Main memory- Magnetic drums and magnetic tapes.
* Programming language- Machine language.
* Power- Consume a lot of electricity and generate a lot of heat.
* were expensive to operate