1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
3 years ago
9

Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you

are a database administrator for a corporation with a large database that is accessible from the Web. What steps would you implement to prevent people from stealing personal information from the corporate database?
Computers and Technology
1 answer:
svetlana [45]3 years ago
5 0

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

You might be interested in
eBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a d
beks73 [17]

Answer: Phishing

Explanation: Phishing is the type of security issue that arises when any individual is contacted by email or message to gain their confidential information through pretending as legal institution so that people can share their information easily.

eBay is also facing such cyber-crime issue so that customer's confidential data like debit card details, credit details details, passwords etc can be achieved through a illegal site posing to be eBay.

3 0
3 years ago
Say you're designing your own operating system, and you want to implement your own paging system. Give one advantage of having s
zheka24 [161]

Answer and Explanation:

Advantages of having large page sizes: Smaller page table, less page faults, less overhead in reading/writing of pages.

Advantages of having small page sizes: reduces internal fragmentation, better with locality of reference.

7 0
4 years ago
Read 2 more answers
A customer bought a goods for Rs.9,000 after getting 10% discount. Calculate the marked price of the goods.Write in Qbasic.​
Darina [25.2K]

Answer:

Rs. 10,000

Explanation:

10% discount means,

customer bought the things at 100% - 10% = 90%

so if 90% --> 9000

1% --> 100

total price = marked price which is 100%

100% ---> 100*100 = Rs. 10,000

7 0
2 years ago
Read 2 more answers
When VPN network traffic is routing only some traffic over the secure VPN while other traffic directly accesses the Internet, wh
stiv31 [10]

Answer:

split tunneling

Explanation:

Based on the information provided within the question it can be said that in this scenario the type of technology being used is known as split tunneling. Like mentioned in the question this refers to when a user is able to access different security domains such as a public network and a WAN at the same time. This can either be done with the same or different network connections.  

3 0
3 years ago
Create an interface called Runner. The interface has an abstract method called run() that displays a message describing the mean
4vir4ik [10]

Answer:

Please find the code and its output in the attached file.

Explanation:

In the above-given code, an interface "Runner" is defined, inside the interface, an abstract method run is declared.

In the next step, three class "Athlete, Machine, and PoliticalCandidate" s defined that implements the run method, and use the print message that holds a given value as a message.

In the next step, a class "DemoRunners" is defined, and inside the main method, the three-class object is declared, which calls the run method.

 

5 0
3 years ago
Other questions:
  • Static packet filtering firewalls are limited to ________. inspecting packets for which there are good application proxy filteri
    8·1 answer
  • I’m order to protect your passwords, don’t use easy-to-guess information, don’t share your passwords, and NEVER change your pass
    13·1 answer
  • Why do many administrators choose to use a command line interface on a Linux server?
    12·1 answer
  • What is the meaning of the FN key and what is its Function
    5·1 answer
  • How can a user view the options for Junk E-mail?
    11·2 answers
  • With respect to computer networks, organizations often install a dedicated telephone system called a ________ to route external
    8·1 answer
  • In a Microsoft Office application, what is the area at the bottom of the application screen that contains information about the
    13·1 answer
  • Do debit cards offer the highest level of fraud pretection?
    10·1 answer
  • The return value is a one-dimensional array that contains two elements. These two elements indicate the rows and column indices
    12·1 answer
  • With a(n) ____ you can arrive at a scene, acquire the data you need, and return to the lab as quickly as possible.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!