1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksley [76]
3 years ago
6

Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta

ck on the internal network. They specialize in building secure firewalls as well as complex intrusion detection systems designed to keep intruders out. They watch and monitor the incoming message traffic very closely. But no matter how well they protect the private network from outside access without proper authority, they do not help prevent an attack by a malicious or disgruntled employee from the inside. And they cannot prevent breaches due to a simple lack of understanding of security policy by internal employees.When do YOU think an organization needs information systems security policies? Why?
Computers and Technology
1 answer:
Alik [6]3 years ago
4 0

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
You might be interested in
Define power supply and types of power supply<br>​
emmainna [20.7K]

Answer:

hope you like it

Explanation:

Two types of power supplies exist, DC-DC and AC-DC. DC-DC power supplies allow you to plug in electrical devices into car outlets or similar sources that supply direct current, or DC, power. These power supplies are not the most commonly used, though.

Classification of Power Supply and Its Different Types

OUTPUT = DC OUTPUT = AC

INPUT = AC Wall wart Bench power supplies Battery charger Isolation transformer Variable AC supply Frequency changer

INPUT = DC DC-DC converter Inverter Generator UPS

4 0
3 years ago
Which network could NOT carry commercial traffic?
sattari [20]

ARPANET would not carry it

4 0
3 years ago
When is it not necessary to invoke the method myMethod using dot notation? When myMethod is private. When myMethod is invoked by
Paraphin [41]

Answer:

When myMethod is invoked by a method in the same class as myMethod.

Explanation:

When you are in a class, it is like a different enviroment and within that class you can call a method without using the dot notation because you are still within the class.

Outside the class and despite the type of method, public, private or static, the dot notation will be required.

5 0
3 years ago
Read 2 more answers
Zoe runs a sports media website that caters to fans of many different types of sports. She's starting a Google Display Ads campa
Alex

Answer:

Affinity Audiences allow her to reach sports enthusiasts.

Explanation:

Affinity Audiences are usually TV-style audiences normally designed with the aim of trying to connect advertisers with the type of customers they are searching for online at any point in time. Google Ads uses this feature via the browser history of the user and the time spent on pages and then associates the users browser with a category of interest.

8 0
3 years ago
In two to four sentences, describe how you would center text.
musickatia [10]
Highlight the text , then on the home toolbar , look for a row of lines , when you hover over each it'll say what is what e.g. align left , or centre . you can also centre text by highlighting it and pressing crtl + e <span />
7 0
3 years ago
Read 2 more answers
Other questions:
  • How to open CD port in PC lenovo ideapad 330​
    14·1 answer
  • What can you do in the Mouse section of the Devices and Printers menu?
    13·1 answer
  • Which of the following is a goal of paraphrasing​
    12·1 answer
  • 5. Which of the following could occur making it necessary for Amy to troubleshoot her computer? Error messages keep popping up,
    12·1 answer
  • What does the acronym GIF stand for? Graphics Interface Format Graphics Interchange Format Going Into Files Gathering Informatio
    12·2 answers
  • When you lost important information how do you gain the information back?
    14·2 answers
  • If you're using the paintbrush tool and want to change the color of the paint being used what should you change
    6·1 answer
  • The main screen of wireshark includes several shortcuts. which shortcut category displays a list of the network interfaces, or m
    15·1 answer
  • 0111101101010110101110110001001011101001011101101010101010110101
    14·1 answer
  • The technique that allows you to have multiple logical lans operating on the same physical equipment is known as a.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!