1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikki [24]
3 years ago
6

Signe wants to improve the security of the small business where she serves as a security manager. She determines that the busine

ss needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use?
Computers and Technology
1 answer:
jek_recluse [69]3 years ago
6 0

Answer:Obscurity

Explanation: Security through the obscurity is the mechanism that is used for the security purpose in an operating system by inducing the confidentiality in the internal parts of the operating system.

The functioning of the security through obscurity(STO) works by hiding the  flaws and errors related to security  of the operating system.Thus , Signe is willing to use obscurity system.

 

You might be interested in
What is a critical consideration on using cloud-based file sharing and storage applications.
Dmitry [639]

Answer:

Determine if the software or service is authorized

Explanation:

:)

3 0
1 year ago
Exodia<br>Principle of Computer Operation​
tamaranim1 [39]

Answer:

????

Explanation:

6 0
3 years ago
List four classification of computer based on their size ​
anyanavicka [17]
There are different sizes like-mini computers, microcomputer, mainframe computer and super computer.
5 0
3 years ago
Quick question... HOW DO YOU FREAKING PUT THE "GREATER THAN EQUAL TO" SYMBOL ON GOOGLE? (sorry i'm frustrated)
satela [25.4K]
On what device are you trying to type it on ? iphone ? android ? computer ?
3 0
3 years ago
Read 2 more answers
Why do computer have Histrorys?
RideAnS [48]
So you know what people are doing so they can be safe at all times
7 0
3 years ago
Read 2 more answers
Other questions:
  • What did Bill Gates invent?
    11·2 answers
  • Ask the user to enter a number n &gt;= 1. There after the user will enter n-1 distinct integers between 1 and n. Thus, the enter
    9·1 answer
  • Explain how each of the five types of prewriting assist a writer in getting started. please make it short.
    15·1 answer
  • By default, PowerPoint ends a slide show with a black slide. <br> a. True<br> b. False
    5·2 answers
  • Set screw compression and indenter are all types of
    13·2 answers
  • In a finite state machine, state transitions happen only: a. When the reset causes a clock pulse on the D outputs of the flip-fl
    11·1 answer
  • Decomposition is
    5·1 answer
  • What is computer system ?​
    9·2 answers
  • How many discussion posts must you complete to meet the Expectations of the replies category
    11·1 answer
  • Which of the following are responsibilities of information security management? Defining the protection required for systems and
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!