1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
3 years ago
5

The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is

an issue of ______________.
Computers and Technology
2 answers:
rewona [7]3 years ago
8 0

Answer: Access control

Explanation:Access control is the type of security facility that is provided to the systems in an organization. The functions carried out in maintaining the security of the system is done by authenticating , authorizing and identification of the users and related components . They are secured using the PINs , passwords, bio-metric scan etc.

The situation of the user wanting to have a unrestrained access towards data as well as maintaining the security is the done by access control.

Mariulka [41]3 years ago
8 0

Answer:

Access control

Explanation:

Access control is a principal part of information security that directs who's permitted to access and utilize organization data and resources.

It is a security strategy that manages who or what can view or utilize resources in a figuring domain.

Physical access control limits access to grounds, structures, rooms and physical IT resources. Coherent access control limits associations with PC systems, framework documents and information.

You might be interested in
No processo fluido a fluido há outra câmara na saída do material extrudado com pressão menor que a câmara anterior. Isso permite
Vesnalui [34]
What is the question ??????????????????????????????????????????????????????????????
4 0
3 years ago
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
Write a Java program that can compute the interest on the next monthly mortgage payment. The program reads the balance and the a
kherson [118]

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

   

    double balance, rate, interest;

   

 System.out.print("Enter the balance: ");

 balance = input.nextDouble();

 

 System.out.print("Enter the annual percentage interest rate [%4.25 must be entered as 4.25]: ");

 rate = input.nextDouble();

 

 if(balance < 0 || rate < 0)

     System.out.println("The balance and/or interest rate cannot be negative!");

 else{

     interest = balance * (rate / 1200);

     System.out.printf("The interest amount $%.2f", interest);

 }

}

}

Explanation:

Ask the user to enter the balance

Ask the user to enter the interest rate as given format

Check the balance and rate. If any negative value is entered, print an error message. Otherwise, calculate the interest using the given formula and print the interest in required format

3 0
3 years ago
Your boss asks you to transmit a small file that includes sensitive personnel data to a server on the network. the server is run
polet [3.4K]
If an attacker can see transmitted packets, they will be able to see login credentials and be able to log in to the server. Additionally, the sensitive data in the file will be visible to the attacker. A better way would be to transfer the file using sftp or tftp.
4 0
3 years ago
What problems can arise if the client, developer, and user are the same person? How can these problems be solved?
Aloiza [94]

Answer:

1 - if all three are the same person then possibility of verifying the software or its scope for the general public will remain unknown

2 - it will not return any profit when all are the same person thus it will remain in one isolated environment

3 - it cannot be used by the masses if all three people are the same person

Explanation:

while building any software system it needs three sets of people who are an important part of this development chain. They are the client, developer, and user. if suppose all three are the same person while developing any software then some problems are occurring and that are mentioned below

1 - if all three are the same person then possibility of verifying the software or its scope for the general public will remain unknown

2 - it will not return any profit when all are the same person thus it will remain in one isolated environment

3 - it cannot be used by the masses if all three people are the same person

the one thing that needs to be done for removing all these problems is to assigned different people for different phases. so that the developer can validate the scope of software in the market.

5 0
3 years ago
Other questions:
  • In your presentation you added a text box to?
    5·1 answer
  • Which commercial email provider is most closely associated with Apple devices?
    9·1 answer
  • You have just made changes to a GPO that you want to take effect as soon as possible on several user and computer accounts in th
    7·1 answer
  • Completed the given flowchart using the algorithm steps which is given in wrong order. 1.Input time 2.Stop 3.Print "Good morning
    8·1 answer
  • Which criterion can be used to select the appropriate type of network media for a network?
    8·1 answer
  • If anyone wants to ft heres the link
    6·1 answer
  • Describing Report Viewing
    5·1 answer
  • A form of segmentation that is based on user usage rate, user status, purchase occasion, and benefits sought is _________.
    13·1 answer
  • Which of the following could be part of an algorithm?
    11·1 answer
  • Taking control of admin functionality and misusing sensitive data that are unauthorized to access are due to.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!