1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Annette [7]
3 years ago
8

How does a firewall provide network security

Computers and Technology
1 answer:
ehidna [41]3 years ago
8 0
Firewalls are connected with a network device which blocks untrusted network forming a barrier in between trusted and un-trusted network.
You might be interested in
What is wrong with the following code? publicstatic char grade(int score) { if (score >= 9) { return 'A'; } else if (score &g
UkoKoshka [18]

Answer:

c) No return statement for all possible logic paths

6 0
2 years ago
Do some Internet research on security vulnerabilities associated with SCADA and digital industrial control systems. Summarize th
Varvara68 [4.7K]

Answer:

Answer explained below

Explanation:

SCADA stands for Supervisor Control and Data Acquisition. It is Industrial control system that uses computers,network devices,graphical user interfaces and other devices such as PLC(Programmable logic controllers) for supervising and controlling industial processes located remotely.

Scada systems are being implemented on a large in various industrial sectors such as petrochemical industries,nuclear power plants,waste water treatment plants,pharmacuetical industries,food and beverage industries etc.

Scada uses various communication and network devices along with various hardware and software components to manage and control the real time processing of the industrial plants.

Although is a very reliable and robust system but its huge network and distributed nature makes it vulnerable to various cyber attacks. The cyber attacks on the Scada system can pose a threat to the industrial and the software environment along with the human race.Since Scada manages many major nuclear plants and petrochemical plants,if anyone hacks into the scada system of these plants it can cause a major threat to complete mankind.

The following are the factors that can cause vulnerabilities in the Scada systems:

The networking of the various enterprise control systems: The remote processing takes place because of the networking of the control systems of the various enterprises.A breach in the security of the enterprise will pose a threat to the working of the control systems.

Insecurity of the remote connections: Scada uses wireless and dial up modems for carrying put the remote activities.If the encryption standards are not followed properly then there can a threat to the information being transferred.

Use of Standard technologies:To ease the working around various platforms and remote locations,the industries have started using standard technologies which means that more number of people are well aware of these technologies and ways to hack them.

Public avalaibility of technical information: The technical information reagarding all the enterprises,their design plans are avalaible to the public on their websites which makes the whole system all the more vulnerable.

How To Avoid Vulnerabilities:

There are standards like ISA99(INdustrial Automation And Control System Security) that offer various strategies and procedures for implementing the security of industrial control systems.

There are government standards and guidelines like NERC-CIP(North American Electrical Reliability Corporation-Critical Infrastructure protection) standard.

Further the industries should good and efficient encryption and authentication techniques for remote communication.

7 0
2 years ago
Submit your business presentation that clearly compares and contrasts three different cell phone service plans..
Dafna1 [17]

Answer:

My three phone service plans are T-Mobile, Verizon, and At&t.

How All of them compare is that the are phone companies and phone services. How T-Mobile contrast with Verizon is that T-mobile has  Bigger Nationwide 5g while Verizon has 5g for big cities, At&t doesn't have that much 5g yet. T-mobile has since combined with Sprint making it a bigger company. if you get Tello unlimited data from T-Mobile you pay $39 a month that means 468 dollars a year. Verizon's Unlimited plans are $80 a month that equals 960 a year. AT7T is much cheaper if you get the AT&T unlimited starters which is 35 a month so 420 a year. I  will go for T-mobile because it's not that cheap or expensive and it is very reliable.

Explanation:

Mark as Brainliest

5 0
3 years ago
Read 2 more answers
Write a program to randomly fill an array of float of 10 elements (use the rand() function and make sure to use #include ) in ma
Lilit [14]

Answer:

#include <iostream>

#include <stdlib.h>

#include <time.h>

using namespace std;

// array fill and returnig array to the main()

float *arrayFill(float *arr) {

// srand() allows generate new random value everytime the program runs

srand(time(NULL));

for (int i = 0; i < 10; i++)

{

 // array fill with random number between 0 to 100

 arr[i] = (rand() % 100);

}

return arr;

}

// print array

void print(float* arr) {

cout << "Array:  ";

for (int i = 0; i < 10; i++)

{

 cout << arr[i] << "   ";

 

}

}

float maxNum(float* arr) {

float temp = arr[0];

for (int i = 1; i < 10; i++) {

 if (temp < arr[i]) {

  temp = arr[i];

 }

}

return temp;

}

int main() {

// creating dynamic array of elements 10 in heap memory

float *arrPtr = new float[10];

float result = 0;

// calling arrayFill()

arrPtr = arrayFill(arrPtr);

// calling print() to print array

print(arrPtr);

// calling maxNum() to find maximum number in the array

result = maxNum(arrPtr);

cout << "\nmaximum number: " << result;

delete[] arrPtr;

return 0;

}

Explanation:

please read inline comments inside the code section:)

4 0
3 years ago
I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
svlad2 [7]

Answer:

The answer is false

Explanation:

Please give me brainliest so I can post my artwork

6 0
3 years ago
Other questions:
  • What is the software called that allows the user to create, access, and manage a database? question 8 options:
    10·1 answer
  • An unwanted 'explosion' of inbox messages is called​
    8·2 answers
  • Jenny is working on a laptop computer and has notices that the computer is not running very fast. She looks and realizes that th
    6·2 answers
  • Describe one example of how technology assits people with data and sample collection
    14·2 answers
  • Match each career with the education required for each job
    12·1 answer
  • Which wildcard characters will return a single character when using the Find dialog box?
    6·2 answers
  • Write a program that lets the user perform arithmetic operations on fractions. Fractions are of the form a/b, in which a and b a
    11·1 answer
  • If you want to change the name of a folder that stores Word documents, what should you do before changing the
    15·1 answer
  • Why is quantum computing potentially a better fit for weather forecasting than classical computers?.
    8·1 answer
  • Array bounds checking should be directly coded into a system rather than assumed.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!