1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
3 years ago
9

Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you

are a database administrator for a corporation with a large database that is accessible from the Web. What steps would you implement to prevent people from stealing personal information from the corporate database?
Computers and Technology
1 answer:
svetlana [45]3 years ago
5 0

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

You might be interested in
why do programs include keyboard shortcuts for certain actions? do you prefer the mouse or the keyboard/ why?
Archy [21]
I would prefer the shortcut because it would make it easier to open tabs and close them too. but the can also help you with other stuff to .
4 0
3 years ago
How do I answer a question on Brainly.com without an “oops” notification?
Paul [167]
You just type in the answer as long as it is more then 20 characters
3 0
3 years ago
Read 2 more answers
13. Which Windows feature allows users to control software operations by clicking and pointing with a mouse?
Thepotemich [5.8K]
The correct answer is option D.
i.e. graphic user interface allows users to control software operations by clicking and pointing with a mouse.

GUI is a type of interface that allows the user to interact through computer graphics.
8 0
3 years ago
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
BlackZzzverrR [31]

Answer: Source

Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.

The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .

The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.

4 0
3 years ago
I WILL GIVE BRAINLEST!!!!!!!!
tekilochka [14]

Answer:

i think it might c but dont trust me

4 0
2 years ago
Read 2 more answers
Other questions:
  • True or false? You can test your marketing emails in different email clients from within the email editor.
    10·1 answer
  • You are provisioning a server with eight-core 3 GHz CMP that can execute a workload with an overall CPI of 2.0 (assuming that L2
    5·1 answer
  • When a user runs an application, what transfers from a storage device to memory?
    8·1 answer
  • What are two constraints that continuous-media files have that conventional data files generally do not have?
    12·1 answer
  • who will follow me on tiktok and like all my videos? if you do ill give branlist and give u a shoutout and you can enter my big
    15·1 answer
  • How is a microkernel architecture different from a monolithic architecture?
    5·1 answer
  • Grace is performing a penetration test against a client's network and would like to use a tool to assist in automatically execut
    13·2 answers
  • Which question about whale sharks is nonscientific?
    11·2 answers
  • In a network, multiple critical paths can occur. true or false
    13·2 answers
  • How would you open the web browser in Linux and still have access to the Linux terminal?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!