1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
1 year ago
12

using the concept of defense in depth, which layers might we utilize to implement defenses to secure ourselves against someone r

emoving confidential data from a desktop pc with a usb flash drive?
Computers and Technology
1 answer:
quester [9]1 year ago
7 0

Environmental protections would need to be in place which would ensure USB threats were non-issue by using the concept of defense in depth. Provide them with work USB sticks that have automatic encryption protection instead of expecting them to find or utilise ones that have been supplied to them by others. One technique to ensure that there won't be a data breach if a USB stick is lost is to use encrypted devices.

A method known as "defence in depth" uses a variety of security measures to safeguard an organization's assets. The idea is that extra layers exist as a backup to ensure that threats are stopped along the road if one line of protection is breached.

In order to safeguard the confidentiality, integrity, and availability of a computer network and the data contained inside it, a number of security methods and controls are deliberately stacked throughout the network. This strategy is known as defence in depth (DiD).

Depending on the point of concentration, defence in depth can be divided into three control layers. These include administrative, technical, and physical controls.

Learn more about defense in depth:

brainly.com/question/13566507

#SPJ4

You might be interested in
Which tool is used to create an interactive web application?
tangare [24]

Answer:

JavaScript is the correct answer

Explanation:

HTML help creates the structural overview, CSS helps in the design and an application software helps in the accessibility, editing, typing of code, but JavaScript helps to make it interactive. Thank you.

7 0
4 years ago
Which of these colors is most likely to be outside the CMYK gamut?
erma4kov [3.2K]
CMYK does not include a white color because it is assumed that it will be printed on a white paper and depending on the percentage of each color that is used, the white from the paper will be used to fill the space, therefore making the shades appear lighter. If it's something that will only be seen digitally, use RGB.
3 0
3 years ago
Sally notices that she has the same set of 10 blocks in her code in multiple places. She decides to create a new block (procedur
SashulF [63]

Answer: it is C. 41

Explanation: i no it

6 0
3 years ago
What is the value of the result after the following statement is executed? int result = 2 + 3 + 4 ;
kow [346]

2 + 3 + 4 = 9 so the value of result is also 9

8 0
3 years ago
Which guideline should you follow when selecting the font for a presentation?
diamong [38]
Most teachers prefer you to use Arial or Times New Roman
3 0
4 years ago
Other questions:
  • What does this mean in python?
    5·1 answer
  • The first thing you should select if you're using an Address Block or Greeting Line is
    11·1 answer
  • 1 Which of these is not an Operating System ?
    7·2 answers
  • Catherine is designing the backup strategy for the new private cloud that her company is implementing. She specifies that a full
    13·1 answer
  • Which statement best describes fonts from a serif font family?
    14·1 answer
  • Identify the programming language released by
    10·1 answer
  • how is a two-dimensional array different from a traditional one dimensional array? From an ArrayList?
    6·1 answer
  • What is the bandwidth for asymmetric digital subscriber line<br> (ADSL)?
    10·2 answers
  • What can visible light and ultraviolet light do together
    14·1 answer
  • Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain control
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!