1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Georgia [21]
3 years ago
5

why do networking components need more examination from an information security perspective than from a systems development pers

pective?
Computers and Technology
1 answer:
padilas [110]3 years ago
4 0
Networking components will eventually interact with computers and devices outside of itself. Whereas during system development you are only interacting with your program internally.

For example, when you first work on a website you can begin working on it on your personal computer not connected to the outside world. When you are done working on your website you will now upload it to a webserver (or you will create your webserver) and now you are opening up the doors so to speak to the Internet. When you "open the door" you need to make sure the proper security is in place so that no one hacks your site. This is ussually done by making sure the webserver you are on does not have any known security vulnerbilities and has the proper firewall settings to prevent unauthorized access.
You might be interested in
a flow chart is the _______ representation of the sequence of steps required of steps required to solve a particular problem​. I
Eddi Din [679]

Answer:

A flowchart is simply a graphical representation of steps. It shows steps in sequential order and is widely used in presenting the flow of algorithms, workflow or processes. Typically, a flowchart shows the steps as boxes of various kinds, and their order by connecting them with arrows.

7 0
3 years ago
Which one of these auto expenses would be considered variable?
In-s [12.5K]
C. Gasoline - the price of gas will "vary" depending on consumption rate and changing gas prices.

A, B, and D are typically scheduled payments that are the same amount each billing cycle; therefore, the price never "varies".
3 0
3 years ago
Sam is conducting research for a school project on the American Revolution. Which of the following kinds of software will help w
SOVA2 [1]

Answer:

Students analyze the techniques that make for good storytelling I think. :}

Explanation:

8 0
3 years ago
Read 2 more answers
*Python Coding
Reika [66]

correct = (["1.B", "6.A", "11.B", "16.C","2.D", "7.B", "12.C", "17.C", "3.A", "8.A", "13.D", "18.B","4.A" ,"9.C", "14.A", "19.D","5.C", "10.D", "15.D", "20.A"])

f = open("MyFile.txt", "r")

user_answers = ([])

count = 0

txt = ""

for x in f.read():

   if x == " " or x == "\n":

       x = ""

       count += 1

   if count == 2 :

       user_answers.append(txt)

       txt = ""

       count = 0

   txt += x

i = 0

cor = 0

wrong = ([])

while i < len(correct):

   if correct[i] == user_answers[i]:

       cor += 1

   else:

       wrong.append(user_answers[i])

   i += 1

questions = ([])

for i in wrong:

   txt = ""

   for w in i:

       if w == ".":

           questions.append(int(txt))

       txt+=w

print("There were {} correct answers".format(cor))

print("There were {} incorrect answers".format(len(questions)))

print("The incorrectly answered questions are {}".format(questions))

f.close()

The file I used for testing looks like:

1. C 6. A 11. B 16. C

2. D 7. B 12. C 17. C

3. A 8. D 13. D 18. D

4. A 9. C 14. A 19. A

5. C 10. D 15. D 20. C

The code only works if there is a new line after 20. C (press enter after that question if a new line isn't already included)

I hope this helps!

4 0
3 years ago
Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________.
vaieri [72.5K]

Options:

(a) ensuring that a system is accessible when needed

(b) defining risk associated with a subject accessing an object

(c) ensuring that a system is not changed by a subject that is not authorized to do so

(d) ensuring that the right information is seen only by subjects that are authorized to see it

Answer:

(c) Ensuring that a system is not changed by a subject that is not authorized to do so.

Explanation:

Access control simply means controlling who accesses a particular data by putting necessary measures in place. The vital components of access control are explained briefly as follows:

<em>Confidentiality</em>: This refers to ensuring that sensitive information are getting to the right people and the right people only. Confidentiality ensures that data or information are getting to those that they are intended. Examples of sensitive information that require confidentiality are

i. Credit card details

ii. Passwords

<em>Integrity</em>: This refers to ensuring that the quality, consistency, accuracy and trustworthiness of an information does not change throughout its time.

It makes sure that data remains the same over a long period of time and in the event that it will be changed, it is not changed by unauthorized subject.

<em>Availability</em>: Just as the name implies, ensures that the data or information is available any time it is needed.

7 0
3 years ago
Other questions:
  • Arpanet was developed by the united states so that there was a communication network that would survive a nuclear war. True or F
    11·1 answer
  • A software license gives the owner the to use software.
    12·2 answers
  • Answer the following questions which are based on the study "Patients' Engagement with Sweet Talk." Submit your answers to the e
    9·1 answer
  • When you respond to an email from your bank that asks you to verify your account information, you may become a victim of a _____
    14·1 answer
  • Consider this data sequence: "fish bird reptile reptile bird bird bird mammal fish". let's define a singleton to be a data eleme
    5·1 answer
  • Today encoding scheme has taken over ascII by what
    5·1 answer
  • What is an activity that can help you enhance the appearance of your computer’s desktop?
    13·1 answer
  • Class members are accessed via the ____(1)_____ operator in conjunction with the name of an object of the class, or via the ___(
    6·1 answer
  • You can insert video by clicking video drop-down menu on the ______ tab.
    15·1 answer
  • Please answer this question​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!