1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bingel [31]
3 years ago
13

In learning information security, it is important to understand that threats to your company's information assets are present 24

/7 and that there is never a time when a threat is not present. Take a look at the following categories of threats. You are in charge of a team that must deal with the below lists of threats. What prevention methods will your team implement to handle the threats? Please explain the reasons for your decisions.1. Acts of human error
2. Software threats
3. Deviations in services
4. Hardware failures or errors
5. Software failures or errors
Computers and Technology
1 answer:
coldgirl [10]3 years ago
8 0

1. Acts of human error

<u>Explanation:</u>

Insecurity their are many threats that make a desktop or workstation or laptop.  Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.

End-users have made sure all required service is activated and running in the organization.

The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.

You might be interested in
you are researching the Holocaust for a school paper and have located several Web sites for information. In a paragraph of no le
jeka94
1. .com .org .edu those have a big part because .com is profit and .org is non profit. 
2. It shows who wrote it 
3. It shows a bio of who wrote it (So you know their actually qualified) 
4. And it has sources to back up for what they say.
7 0
3 years ago
_____ is an environment where processors are embedded in objects that communicate with one another via the Internet or wireless
gladu [14]
The answer is Internet of Things (IoT)
8 0
3 years ago
I think you have been doing a great job but you haven’t been signing many people up for our new service feature I want you to se
STatiana [176]

Answer:

24 customers

Explanation:

Given

Customers = 96

p = 25\% --- proportion to sign up

Required

The number of customers to sign up

This is calculated as:

n = p * Customers

So, we have:

n = 25\% * 96

n = 24

5 0
3 years ago
What is the primary difference between a Marketing Information System (MIS) and a Decisions Support System (DSS)? a. Cost of imp
SOVA2 [1]

A DSS uses software that allows managers to more fully utilize available information to assist in making decisions  is the primary difference between a Marketing Information System (MIS) and a Decisions Support System (DSS).

<h3><u>Explanation:</u></h3>

A management information system that helps the marketers in making important decisions that are related to the marketing fields refers to the marketing information system. It is the system where the information that are associated with the marketing will be gathered and analysed for making important decisions by the marketing managers.

The information system that helps an organisation in making important decisions are called as Decision support system. The main thing that differentiates MIS and DSS is that A DSS uses software that allows managers to more fully utilize available information to assist in making decisions.

8 0
3 years ago
When creating an input/output table, where do you enter the formula?
balu736 [363]

When creating an input/output table, where do you enter the formula?  

A. In the input cell

B. In the output cell

C. In the title cell

D. In the table of contents


<u>ans. (B) In the output cell</u>

4 0
3 years ago
Other questions:
  • How can you have a safe browsing experience
    5·1 answer
  • Which of the following is NOT true about variables?
    13·1 answer
  • Justify the statement "The same job title can have different job roles and different qualification criteria in different organiz
    7·1 answer
  • Elisa and Josh need to access General Help. Elisa will press the F1 key. Josh will click on ? in the upper-right corner of the W
    14·2 answers
  • Which is an unethical use of technology and resources at the workplace?
    13·2 answers
  • What is not true about contracts?
    12·2 answers
  • A typical item in a plan of procedure includes the name of the part of the ______ to
    5·1 answer
  • _is a computer network created for an individual person
    10·1 answer
  • A pointer is the memory address of a variable. FALSE TRUE
    9·1 answer
  • 71 81 77 15 63 96 36 51 77 18 17
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!