1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
1 year ago
12

using the concept of defense in depth, which layers might we utilize to implement defenses to secure ourselves against someone r

emoving confidential data from a desktop pc with a usb flash drive?
Computers and Technology
1 answer:
quester [9]1 year ago
7 0

Environmental protections would need to be in place which would ensure USB threats were non-issue by using the concept of defense in depth. Provide them with work USB sticks that have automatic encryption protection instead of expecting them to find or utilise ones that have been supplied to them by others. One technique to ensure that there won't be a data breach if a USB stick is lost is to use encrypted devices.

A method known as "defence in depth" uses a variety of security measures to safeguard an organization's assets. The idea is that extra layers exist as a backup to ensure that threats are stopped along the road if one line of protection is breached.

In order to safeguard the confidentiality, integrity, and availability of a computer network and the data contained inside it, a number of security methods and controls are deliberately stacked throughout the network. This strategy is known as defence in depth (DiD).

Depending on the point of concentration, defence in depth can be divided into three control layers. These include administrative, technical, and physical controls.

Learn more about defense in depth:

brainly.com/question/13566507

#SPJ4

You might be interested in
A signal has a wavelength of 1 11m in air. How far can the front of the wave travel during 1000 periods?
olchik [2.2K]

Answer:

A signal has a wavelength of 1 μm in air

Explanation:

looked it up

6 0
2 years ago
15 points. Please give an actual answer and not some random thing. this is not just free points. Correct answer will receive bra
trapecia [35]

Answer:

i think its b

Explanation:

i did the test and got it right

7 0
3 years ago
Read 2 more answers
Human systems integration (hsi), a supportability issue that every program should consider, addresses such factors as accessibil
Tju [1.3M]

I guess the word in the blank is Standardization.

Human systems integration (HSI), a supportability issue that every program should consider, addresses such factors as accessibility, visibility, testability, and Standardization.


6 0
3 years ago
2-3 Calculating the Body Mass Index (BMI). (Programming Exercise 2.14) Body Mass Index is a measure of health based on your weig
Luden [163]

Answer:

weight = float(input("Enter your weight in pounds: "))

height = float(input("Enter your height in inches: "))

weight = weight * 0.45359237

height = height * 0.0254

bmi = weight / (height * height)

print("Your BMI is: %.4f" % bmi)

Explanation:

*The code is written in Python.

Ask the user to enter weight in pounds and height in inches

Convert the weight into kilograms and height into meters using given conversion rates

Calculate the BMI using given formula

Print the BMI

5 0
3 years ago
Computers can accomplish many tasks today, but there are still some things they cannot do. Think of some of the things you would
postnew [5]
Record our dream.
Since it is from the future and advanced, it is invalid to argue back that the wish to record our dreams cannot be fulfilled.

From here you can elaborate more ...
7 0
3 years ago
Other questions:
  • Mark had been a resident of Larchmont for 17 years, and local folks thought of him as a solid citizen. "In this sentence, the wo
    7·2 answers
  • Alicia is a dietitian. She gives other people suggestions for nutrition. She wants to organize a large amount of data concerning
    13·1 answer
  • When using a template to compose a memorandum which key on the keyboard moves the cursor to the next field
    15·1 answer
  • Assume the following variable definitions int a = 5, b = 12; double x = 3.4, z = 9.1. What are the values of the following expre
    7·1 answer
  • Was the big blue button thing a good decision or bad?<br> *I think it was a bad idea.
    15·2 answers
  • The phrase has become an Internet buzz word. It refers to a top-level domain name for communications organizations.TrueFalse
    12·1 answer
  • What are three ways you cite evedince
    5·2 answers
  • Mihaela I. Croitoru – Utilizarea calculatorului personal Microsoft Word dau coroana
    14·1 answer
  • Fill in the blank: _________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to fi
    9·1 answer
  • Explain different types of networking-based attacks
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!