1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
4 years ago
9

Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you

are a database administrator for a corporation with a large database that is accessible from the Web. What steps would you implement to prevent people from stealing personal information from the corporate database?
Computers and Technology
1 answer:
svetlana [45]4 years ago
5 0

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

You might be interested in
Why are id thieves hard to catch?
Paladinen [302]
Because they will change their identity and therefore they will never have the same name for a long period of time . So when they commit a crime , they will be difficult to find and catch
5 0
3 years ago
Free Write Friday 2/26/21
Bad White [126]
Write about art bc thags always so cool
4 0
3 years ago
Signed ints versus unsigned ints:
julia-pushkina [17]
The answer is c !!!!!!!!!
7 0
4 years ago
The name of the opening that lets light into any camera is called ________.
Arturiano [62]
The answer would be : t<span>he shutter.
</span>
Hope this helps !

Photon
8 0
3 years ago
Read 2 more answers
1. The purposes of traffic signs are
Wittaler [7]

Answer:

<em>D. to regulate, to warn, to guide.</em>

3 0
3 years ago
Other questions:
  • Which file is used to determine which tty devices the root user is allowed to log in to?
    8·1 answer
  • Currently, there are two major techniques used to develop programs and their procedures. name and describe them. html editor key
    11·1 answer
  • Which of these consoles have 64 bit architecture
    13·1 answer
  • Prompt the user for a character and the height of a right triangle. Then, print a triangle of that height using the character en
    11·1 answer
  • Which command backs up the single database called 'websites' to the file 'websites_backup.sql'?
    10·1 answer
  • I need to know what is share market plssss
    8·2 answers
  • Ancler Corporation wants to calculate how much their profits were in the first quarter of the year. They should use a
    6·2 answers
  • Discuss the importance of top management commitment and the development of standards for successful project management. Provide
    10·1 answer
  • The function changeLocation is also called a _____.
    5·2 answers
  • Which of the following correctly describes the reason for quality customer service?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!