1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prohojiy [21]
3 years ago
11

What is the difference between requirements and controls in the security process? Give examples of each.

Computers and Technology
1 answer:
konstantin123 [22]3 years ago
4 0

Answer:

Security controls are those measures taken to prevent, identify, counteract, and reduce security risks to computer systems, whereas, Security Requirements are guidelines or frameworks that stipulates measures to ensure security control.

Explanation:

Security controls encompass all the proactive measures taken to prevent a breach of the computer system by attackers. Security requirements are those security principles that need to be attained by a system before it can be certified as safe to use.

Security controls are of three types namely, management, operational, and technical controls. Examples of technical controls are firewalls and user authentication systems. A statement like 'The system shall apply load balancing', is a security requirement with an emphasis on availability.

You might be interested in
Which of the following may present a problem for Linux users?
motikmotik
Tendancy to crash hope that helped
6 0
4 years ago
Read 2 more answers
A.
blondinia [14]

Answer:

the electronic devices that are used for storing and processing data typically in binary from according to instructions given to it in a variable program . its major parts are 1 keyboard. mouse .monitor. cpu

Explanation:

i think this one is of a number

7 0
3 years ago
1. an image can be stored either in a vector graphic file or in a bitmap file true or false
lions [1.4K]

Answer:

1 true 2 true 3 false 4 true

Explanation:

7 0
3 years ago
30points!!!! Plz answer quickly
stich3 [128]

Answer:

center

Explanation:

that is the focal point

3 0
3 years ago
Read 2 more answers
Does coaxial cable use radio waves to transmit data
Elan Coil [88]
Coaxial cable<span>, or </span>coax<span> (pronounced </span><span>/<span>ˈkoʊ.æks</span>/</span><span>), is a type of </span>cable<span> that has an inner conductor surrounded by a tubular insulating layer, surrounded by a tubular conducting shield. Many coaxial cables also have an insulating outer sheath or jacket. The term </span>coaxial<span> comes from the inner conductor and the outer shield sharing a geometric axis. Coaxial cable was invented by English engineer and mathematician </span>Oliver Heaviside, who patented the design in 1880.[1]<span> Coaxial cable differs from other </span>shielded cable<span> used for carrying lower-frequency signals, in that the dimensions of the cable are controlled to give a precise, constant conductor spacing, which is needed for it to function efficiently as a </span>transmission line<span>.</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • It is essential that a security professional is able to resolve and respond to cyber law inquiries and incidents while avoiding
    14·1 answer
  • The most commonly used software in the school systems that include word processor, spreadsheet, database management system, and
    6·1 answer
  • When long labels are required, which of these commands can you use to improve readability of a worksheet? .
    7·2 answers
  • Which of the following are examples of how a company might use consumer data it had collected? a To decide what types of product
    10·1 answer
  • What type of multimedia are live news feeds? Live news feeds are examples of ________ multimedia. 20 POINTS PLZ HELP
    5·2 answers
  • NEXT
    15·2 answers
  • Which of the statements below are true? Which are false?
    14·1 answer
  • When we connect to a story, it can be mental, emotional, or even physical. <br> True or False?
    5·1 answer
  • Question 3 (5 points) ✔ Saved Janice is scrolling through her feed one day and notices that Abby said some awful things about Pa
    14·2 answers
  • What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!