1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
3 years ago
6

There are many opportunities for unscrupulous people to break information system security. Of the five components in an informat

ion​ system, which component poses the​ greatest, ongoing security​ risk?
a. Hardware
b. Procedures
c. Data
d. Software
e. People
Computers and Technology
2 answers:
7nadin3 [17]3 years ago
8 0

The answer is letter e.

People is the component poses the very large ongoing security risk. It also can be a threat to the safety. People play an essential part in most operational systems and methods. Information, ability and mental outlook often determine the feature and quantity of system output. Just as a stereo requires the right component, high-performance business systems require the right fit of people to work.


Romashka-Z-Leto [24]3 years ago
7 0

Answer

People

Explanation

Information system security is the protection of information and the information systems from the unauthorized access   use, disclosure, disruption, modification, or destruction by the people who have negative minds concerning the data in the these systems. This is done by employing the information security management process. This helps in protecting the information assets.

People are greatest, ongoing security​ risk to the information systems because they are the ones who manages these systems and they can access them for the purpose of their own benefits without the knowledge of the company. Also hackers are a high risk to the systems because they have a ability to interfere with the systems and get the information they require

You might be interested in
Management of software development consist of?
JulsSmile [24]

Answer:

d. All of the above

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

In Computer science, management of software development consist of;

a. Process: it involves the stages through which a software application is analyzed, designed, developed, tested, etc.

b. People: it refers to the individuals involved in the software development process.

c. Project: it's the entirety of the stages a software goes through before it gets to the end user.

5 0
3 years ago
White meat and dark meat fish have slightly different nutritional characteristics. What are the nutrition characteristics of dar
Marina CMI [18]

The nutrition characteristics of eating darker meat of fish like Salmon are that it is higher in healthy Omega-3 fats. It is true, however, that as much as it has the highest Omega-3 fats, it is also likely to be highest in any potential toxins.






7 0
3 years ago
Read 2 more answers
Purpose for a Phone....?
jeka94
Used to talk to people, chat with people on mobile.
5 0
3 years ago
Read 2 more answers
Which of the following statements is true? Methods and instance variables can both be either public or private. Information hidi
Alex777 [14]

Answer:

B

Explanation:

8 0
3 years ago
Write a story, a tale, a biography or a diary.
antoniya [11.8K]
I will write a very short story, so I hope this helps a little

The processing of gold: A diary entry

April 5/2018

I am the worlds most precious metal. 
I am worth more than any silly diamond, and far more stronger than Iron. No one can come close to being as important as I.

I start as a tiny mineral, found underground where I spend my days perfecting myself. Most might find relatives of mine in water, buried among sand and dirt. Then we are put through the most rigorous of training until we are god.

Well, gold, but you know what I mean.

Once I am perfection, I will be sold among the masses of people.   I will be loved my all and crafted into everything. If I wanted, I could take over the world...a world of just gold, wouldn't that be magical?

Today I think I will be made into a ring, I hope I am not squeezed on some fat woman's finger.

I hope this helps a little, Cheers :)

6 0
4 years ago
Other questions:
  • Which protocols are TCP/IP application layer protocols? (choose all that apply)
    5·2 answers
  • According to the municipal solid waste report what are the benefits of recycling
    6·1 answer
  • Your baby brother has found the hammer and is eagerly eyeing one of the boxes. Describe and analyze an algorithm to determine if
    15·1 answer
  • Voice authentication requires speech to text capability Facial recognition may be used for authentication The human iris is uniq
    6·1 answer
  • A type of VPN connection, where a single computer logs into a remote network and becomes, for all intents and purposes, a member
    13·1 answer
  • Why is failure important when you are designing a solution to a problem?
    6·2 answers
  • 1: define about information system in computer?
    10·1 answer
  • An international fast-food chain is looking for opportunities to leverage the Cloud to gain insights into customer data, includi
    10·1 answer
  • Integrity! He talks to me of integrity! I described a circle in the air. I'd tried to build my integrity upon the role of Brothe
    12·1 answer
  • Assume that Publication is the root class of an inheritance tree. You want to form a linked list of different publications in th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!