Answer:
Security controls are those measures taken to prevent, identify, counteract, and reduce security risks to computer systems, whereas, Security Requirements are guidelines or frameworks that stipulates measures to ensure security control.
Explanation:
Security controls encompass all the proactive measures taken to prevent a breach of the computer system by attackers. Security requirements are those security principles that need to be attained by a system before it can be certified as safe to use.
Security controls are of three types namely, management, operational, and technical controls. Examples of technical controls are firewalls and user authentication systems. A statement like 'The system shall apply load balancing', is a security requirement with an emphasis on availability.
#2: Portrait taller than wide & landscape wider than tall
Answer:
Switch the two existing EC2 instances for an auto scaling group and registered them with the network load balancer
Create a network load balancer with an interface in each subnet, and assign a static IP address to each subnet.
Explanation:
Answer:
C. real time web access
Explanation:
Real time web access can be used to demonstrate how to do something special on the web, such as displaying articles found on websites that support your topic.
It can also be used to it provide a sense of immediacy to your speech.
It involves employing a live internet feed as a visual media or information resource during a speech, that is using a real time video online to deliver your speech.
Answer:
cyber ethics
Explanation:
code of responsible behavior on the Internet. Just as we are taught to act responsibly in everyday life with lessons such as "Don't take what doesn't belong to you" and "Do not harm others," we must act responsibly in the cyber world.