<span>In the scenario in which the IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously the DDoS security attack is occurring.
</span>DDos stands for Distributed Denial of Service<span> . This </span><span>attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.</span>
Answer:
You could have a bug, virus, or you might have been hacked the most I can tell you is try to contact a technician to check it and try to help you. It could also be a problem with your internet, maybe you hit your computer against something and it broke something inside, or it could be a technical glitch. I hop this helps! Good Luck fixing your computer!
Answer: Mutual authentication
Explanation: Mutual authentication could be referred to a vetting process where the two entities in communication authenticate each other, it could also be referred to as a two-way authentication.
In the scenario above, the cloud service or server authenticates itself with the client and the client authentication itself with the cloud service server by verifying or vetting the certificates of both communicating entities before a secure encrypted connection would be established or created.
Answer:
IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.
Mature security policies need the following procedures.
- Acceptable use policies
- Access control policy
- Change management policy
- Incident Response
- Information Security
- Remote Access
- Email Policy
- Business Continuity Plan
Explanation:
Internet use policy
Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.
External device use policy
An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.
Employee Identity (ID) policy
Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.
Computer use policy
Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.