1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Debora [2.8K]
3 years ago
11

Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o

n her computer that could be at risk of being stolen or breached?
Jorge is a writer for a local newspaper. He does not have an office and uses local cafes, etc. to write. He does use a tablet to access the newspaper's network. What type of data or information could Jorge have that could be at risk?

Wanda is a college professor at a local community college. She often works from her office and away from her home office at various locations when meeting with a student. She uses a tablet for checking e-mail and grading. Explain the type of data or information that Wanda has at risk?

Carl is a meter reader and travels over large areas of land everyday. He uses a laptop to check e-mail and connect to the company's network. What type of data might be stored on his laptop that could be at risk? What are ways he can protect the data?
Computers and Technology
1 answer:
polet [3.4K]3 years ago
8 0

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

You might be interested in
Give an example of SaaS (Software as a service) and explain why this can impact organisational security posture
lara31 [8.8K]

In the case above, An  example of SaaS (Software as a service) are DropBox, UserGuiding and Salesforce.

<h3>How does SaaS (Software as a service) impact organizational security posture?</h3>

Software-as-a-Service (SaaS) security posture management (SSPM) is known to  be a kind of a group that is made up of an automated security tools that is used for tracking security threats in regards to SaaS applications.

<h3>What is organization level security in Salesforce?</h3>

The organizational level is known to be one that gives room for a person to decide if and from where a given users can be able to access the system.

Note that SaaS platforms is made up of software that is said to be available via third-party and they include BigCommerce, Salesforce and others.

Learn more about SaaS from

brainly.com/question/24852211

#SPJ1

4 0
2 years ago
What is the recommended solution to configure this automated behavior? UC has a requirement that an opportunity should have a fi
Dmitry_Shevchenko [17]
The answer will need to be workflow.
8 0
4 years ago
. <br> It matters if you capitalize your search words in a search engine<br> True<br> False
Natasha2012 [34]

Answer:

false

Explanation:

search engines really don't care. they'll find the answer almost always whether or not you capitalize things

5 0
3 years ago
What runs horizontally and is identified with numbers?
timama [110]
The answer to this question is C. Row
In excel, The number of Rows will be placed on the Left side of the sheet.
Rows will be utilized together with a column in order to differentiate specific cells with another.
This differentiation will be useful if user wanted to create a certain formula within the sheets
4 0
3 years ago
Read 2 more answers
What is an activity that can help you enhance the appearance of your computer's desktop?
pishuonlain [190]
Depends? Maybe you can change the background of your computer?
3 0
3 years ago
Read 2 more answers
Other questions:
  • What does ip mean? internet protocol address internet program internet process (system software) internet prescience?
    6·1 answer
  • During working hours an electrician should not wear
    13·1 answer
  • How to know your pc does not have bluetooth?
    14·1 answer
  • The proper hand position for keyboarding.
    7·1 answer
  • Which hexadecimal-type address refers to a physical networking device such as a network interface card?
    10·1 answer
  • In UML behavioral modeling, a message is _____. (Points : 6) a named location in memory where information is deposited and retri
    7·1 answer
  • In what ways can you sort data by using the sort procedure? Check all that apply.
    6·1 answer
  • My uh coding teacher would like the class to do little piggy with code.
    10·1 answer
  • Look at (c), is it accurate? ​
    9·2 answers
  • write the implementation (.cpp file) of the gastank class of the previous exercise. the full specifiction of the class is:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!