1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gwar [14]
4 years ago
9

Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?

Computers and Technology
1 answer:
olchik [2.2K]4 years ago
5 0

Answer:

 The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.

The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.  

You might be interested in
The first step in the information processing cycle is _____, which involves entering data into the computer.
Dmitry [639]

Answer:

INPUT

Explanation:

Information Processing Cycle is defined as the series of stages followed in processing information. Those stages include:

  • Input
  • Processing
  • Storage
  • Output

Input involve entering the data/information into the computer

Processing involve the computer performing some computation on the data

Storage involve saving the data and/or result to the any medium for future use.

Output involve displaying or presenting the results to the user.

4 0
3 years ago
If you want the date in your document to update each time the document is opened, _____.
den301095 [7]
By clicking the update automatically<span> checkbox when inserting the date and/or time into a Word document... hope this helps!!!!</span>
8 0
3 years ago
Read 2 more answers
What does the asterisk (*) after select tell the database to do in this query?
OlgaM077 [116]

In the case above, The asterisk helps database or tell it to select all data that meets the criteria as stated in the query.

<h3>What does asterisk (*) mean in SQL?</h3>

The term means all columns. Note that The asterisk or star symbol ( * ) is a term that implies all columns in a given database.

Therefore, In the case above, The asterisk helps database or tell it to select all data that meets the criteria as stated in the query.

Learn more about asterisk from

brainly.com/question/1620017

#SPJ11

4 0
2 years ago
private members of a class are accessible only from _____________ of the same class or from their friends
maxonik [38]

Answer: Within other member

Explanation:

 The private data member is also known as private function in the computer programming language. The private keyword is basically used to specify the access level and also provide the variable and the methods control to the programmers in the class.

In the class, the variables and the method are directly access by the other methods with the same class but not directly access by the derived class. Therefore, the private members of the class are easily access from the other member of the similar class and also from friends.    

8 0
3 years ago
Which is true about TCP and UDP? Choose two answers.
vichka [17]

Answer:

TCP is a connection-oriented protocol

UDP does not acknowledge a receipt of data

Explanation:

TCP (Transmission Control Protocol) is a protocol to transfer data, this is one of the most important protocols on the entire internet, this method was implemented from the beginning of the network.

UDP (User Datagram Protocol) this is a protocol faster than TCP because this method doesn't establish a connection to sent data, in this case, always sent data, but TCP is more secure than UDP, and for that UDP is used to transfer music or videos, and TCP websites and database.

UDP doesn't need acknowledgment is done by UDP, is only concerned with speed.

7 0
3 years ago
Other questions:
  • When you identify the data elements in a new database, you typically subdivide data elements into?
    14·1 answer
  • When working in the middle of a presentation, how do you preview the slide show from the current slide?
    12·1 answer
  • In a Microsoft Office application, what is the area at the bottom of the application screen that contains information about the
    13·1 answer
  • A ________ is a question you ask about data stored in a database
    9·1 answer
  • Any material that comes into contact with the body must be __________.
    6·1 answer
  • A(n) __________ prevents outsiders from accessing corporate information the user does not want others to see.
    9·1 answer
  • Explaio mode of Operation of x-ray​
    15·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
  • What is pollution?
    14·2 answers
  • [If you were the queen of the world .... What would you change ?]
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!