1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
1 year ago
12

using the concept of defense in depth, which layers might we utilize to implement defenses to secure ourselves against someone r

emoving confidential data from a desktop pc with a usb flash drive?
Computers and Technology
1 answer:
quester [9]1 year ago
7 0

Environmental protections would need to be in place which would ensure USB threats were non-issue by using the concept of defense in depth. Provide them with work USB sticks that have automatic encryption protection instead of expecting them to find or utilise ones that have been supplied to them by others. One technique to ensure that there won't be a data breach if a USB stick is lost is to use encrypted devices.

A method known as "defence in depth" uses a variety of security measures to safeguard an organization's assets. The idea is that extra layers exist as a backup to ensure that threats are stopped along the road if one line of protection is breached.

In order to safeguard the confidentiality, integrity, and availability of a computer network and the data contained inside it, a number of security methods and controls are deliberately stacked throughout the network. This strategy is known as defence in depth (DiD).

Depending on the point of concentration, defence in depth can be divided into three control layers. These include administrative, technical, and physical controls.

Learn more about defense in depth:

brainly.com/question/13566507

#SPJ4

You might be interested in
What is Gamekit Loa3's all questsions
Stells [14]
Video games and currency premium playing
4 0
3 years ago
(I WILL GIVE BRAINLIEST) Which steps will delete an appointment?
Nastasia [14]

Answer:

right clicking should be your answer

3 0
3 years ago
Which two technologies support the building of single-page applications? and are two technologies helpful in building single pag
Sholpan [36]

Answer:

You can use JavaScript, HTML, PHP and so forth.

Explanation:

7 0
3 years ago
Search engines use indexes created by web _________ to provide fast searches.
Nastasia [14]
Search engines use indexes created by web crawlers to provide fast searches.
3 0
3 years ago
Zoom meeting ID:987 6858 5587 Password:196133
Llana [10]
I might join I’m not sure tho is there gonna be a lot of ppl?
3 0
3 years ago
Read 2 more answers
Other questions:
  • A job application is a form used to make a job request.<br> True<br> False
    8·2 answers
  • What is a strictly layered pattern, provide an example of its usage.
    13·1 answer
  • The benefits of flextime include:
    11·2 answers
  • What are two advantages of encrypting data stored in the computer system?
    5·1 answer
  • Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free pro
    14·1 answer
  • Identify at least five different Information Technology careers that you could pursue in your home state, and choose the three t
    10·2 answers
  • Jin needs to add a row into his spreadsheet, but he does not want to remove any existing data. Which combination of options shou
    6·2 answers
  • What is one way to recognize whether an online source has been copyrighted? The source features the phrase “all rights reserved.
    6·2 answers
  • Selma writes the following four answers in her Computer Science examination.
    8·2 answers
  • (Language: Python) How can you know what value is in a variable by looking at the code?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!