1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
3 years ago
6

There are many opportunities for unscrupulous people to break information system security. Of the five components in an informat

ion​ system, which component poses the​ greatest, ongoing security​ risk?
a. Hardware
b. Procedures
c. Data
d. Software
e. People
Computers and Technology
2 answers:
7nadin3 [17]3 years ago
8 0

The answer is letter e.

People is the component poses the very large ongoing security risk. It also can be a threat to the safety. People play an essential part in most operational systems and methods. Information, ability and mental outlook often determine the feature and quantity of system output. Just as a stereo requires the right component, high-performance business systems require the right fit of people to work.


Romashka-Z-Leto [24]3 years ago
7 0

Answer

People

Explanation

Information system security is the protection of information and the information systems from the unauthorized access   use, disclosure, disruption, modification, or destruction by the people who have negative minds concerning the data in the these systems. This is done by employing the information security management process. This helps in protecting the information assets.

People are greatest, ongoing security​ risk to the information systems because they are the ones who manages these systems and they can access them for the purpose of their own benefits without the knowledge of the company. Also hackers are a high risk to the systems because they have a ability to interfere with the systems and get the information they require

You might be interested in
Plagiarism occurs when writers
Law Incorporation [45]
The answer is A. <span>Use others' ideas and writing as their own </span>
7 0
4 years ago
Read 2 more answers
Bugs bunny personality traits
Dafna1 [17]

Answer:

As a character, Bugs Bunny is king, and he's as close to an animated culture hero as we're going to get. Think about it. He's the person you want to be — the smartest one in the room who's still effortlessly cool. He's quick-witted, funny, and even a little cruel, but only to his tormenters.

Explanation:I hope this helps!!!Plz leave a heart and a rating!!

3 0
4 years ago
How is hardware different from sofware?
ExtremeBDS [4]

Answer:

Computer hardware is any physical device used in or with your machine, whereas software is a collection of code installed onto your computer's hard drive. For example, the computer monitor you are using to read this text and the mouse you are using to navigate this web page are computer hardware.

All software utilizes at least one hardware device to operate. For example, a video game, which is software, uses the computer processor (CPU), memory (RAM), hard drive, and video card to run. Word processing software uses the computer processor, memory, and hard drive to create and save documents.

6 0
4 years ago
In 1–2 sentences describe the purpose of comparison operators and give an example.
love history [14]
Comparison operators are used to compare between objects!
are they equal?  is one greater than the other?

if (a == b) ++a;
if (a > b) a = b;

for example when we use a sort function, comparison operators are used inside the function.

7 0
3 years ago
Which of the following describes how modern operating systems function?: A
sertanlavr [38]

Answer:

Try B

Explanation:

6 0
3 years ago
Other questions:
  • A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company n
    9·2 answers
  • Christine would like to add something to her document that will illustrate the text. She should _____.
    10·2 answers
  • Consider the following method:
    8·2 answers
  • What type of network is a private network that belongs to an organization that can only be accessed by approved internal users?
    15·1 answer
  • When trying to work efficiently, how should you prioritize your tasks? (Site 1)
    8·1 answer
  • What is Automation ? Please give an example ?
    14·1 answer
  • Why is one climate different from another?
    14·1 answer
  • Sergio needs to tell his team about some negative feedback from a client. The team has been
    14·1 answer
  • Who like anime becus i dooooo ( wrote this becuse i forgot what i was writing abot)
    13·1 answer
  • Apart from using secure networks, how else can Dhruv keep his deliverables safe in the office and on the go? Select all that app
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!