The answer is Object-oriented programming (OOP). This is a type of programming language model on the concept of "objects", which may comprise of data, in the form of fields, often known as attributes; and code, in the form of procedures, often known as methods. The first step here is to classify all the objects the programmer wants to work and how they relate to each other, this is known as data modeling. Once an object has been identified, it is generalized as a class of objects which describes the type of data it comprises and any logic sequences that can manipulate it.
<u>Threat </u>is some danger that can exploit a vulnerability.
<h3>What is Threat?</h3>
Threat is seen as Anything that can be able to take advantage of a vulnerability, intentionally as well as accidentally, and take or damage, the asset of a person.
Note that a threat is that which a person or firm is protect against and Vulnerability is seen as Weaknesses.
Therefore, <u>Threat </u>is some danger that can exploit a vulnerability.
Learn more about vulnerability from
brainly.com/question/25633298
#SPJ1
Answer:
A honeypot is a computer network set up to act as a decoy to track, deflect, or research trying to obtain unwanted access to the information system.
Explanation:
A honeypot is a device or device network designed to imitate possible cyber-attack targets. It can be utilized to detect or deflect assaults from a legitimate military target. It may also be used to collect knowledge on how cybercrime works.
<u>Advantage:-
</u>
- Data Value:-
One of the challenges faced by the research community is to obtain meaning from big data. Companies hold large quantities of data daily including firewall logs, device logs, and warnings for vulnerability scanning.
- Resources:- The problem facing most protection systems is resource shortages or even the depletion of resources. Power saturation is when a protection asset can no longer work since it is overloaded by its assets.
- Simplicity
:- I find simplicity to be the biggest single strength of honeypots. No flashy techniques are to be created, no stamp computer systems to be managed, no rule units to be misconfigured.
<u>Disadvantage:- </u>
That honeypot doesn't replace any safety mechanisms; they just operate with your overall security infrastructure and improve it.
Answer:
Last option: <em>Not </em>statement
Explanation:
Anything outside the borders of the circles are considered the <em>not</em> Boolean statement since the circles represent <em>or</em> and the overlap represents <em>and</em>.
Hope this helps :)
Amigo o amiga q está haciendo esto no c que seg oficia y lo siento