1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sasho [114]
3 years ago
11

Chapter 15 Problem 6 PREVENTIVE CONTROLS Listed here are five scenarios. For each scenario, discuss the possible damages that ca

n occur. Suggest a pre-ventive control. a. An intruder taps into a telecommunications device and retrieves the identifying codes and personal identification numbers for ATM cardholders. ( The user subsequently codes this information onto a magnetic coding device and places this strip on a piece of cardboard.) b. Because of occasional noise on a transmission line, electronic messages received are extremely garbled. c. Because of occasional noise on a transmission line, data being transferred is lost or garbled. d. An intruder is temporarily delaying important strategic messages over the telecommunications lines. e. An intruder is altering electronic messages before the user receives them.
Computers and Technology
1 answer:
sineoko [7]3 years ago
7 0

Answer: seen below

Explanation:

There are various solution or ways to go about this actually. In the end, curtailing this is what matters in the end.

Below i have briefly highlighted a few precise way some of this problems can be solved, other options are open for deliberation.

A. Digital encoding of information with the calculation being changed occasionally, particularly after the frameworks advisors have finished their employments, and the framework is being used.

Which can also mean; The money could be withdrawn form the ATM. preventive Control is password to be changed periodically and regularly.

B. Noise on the line might be causing line blunders, which can bring about information misfortune. Reverberation checks and equality checks can assist with recognizing and right such mistakes.

C. If information is being lost, reverberation checks and equality checks ought to likewise help; notwithstanding, the issue might be that an intruder is blocking messages and altering them. Message arrangement numbering will assist with deciding whether messages are being lost, and in the event that they are maybe a solicitation reaction strategy ought to be executed that makes it hard for gatecrashers to dodge.

D. In the event that messages are being postponed, a significant client request or other data could be missed. As in thing c, message arrangement numbering and solicitation reaction methods ought to be utilized.

E. Messages modified by intruders can have an extremely negative effect on client provider relations if orders are being changed. For this situation, information encryption is important to keep the gatecrasher from perusing and changing the information. Additionally, a message succession numbering strategy is important to ensure the message isn't erased.

cheers i hope this was helpful !!

You might be interested in
Game design colleges anyone know the requirements??
tester [92]
Basic understanding of code language such as Java, C++, Swift (iOS) etc. without knowledge of these, you’ll be lost trust me. Study up on these in your spare time. They do teach this stuff in college, but being ahead of the game is always good. No pun intended kek ;D
8 0
3 years ago
What is the group scope for domain admins, domain controllers, and domain users default groups?
Igoryamba
The group of domain admins, domain controllers, and domain users default group is global. Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions.
4 0
3 years ago
Which website navigation method consists of a single web page containing a list of hyperlinks representing all the pages in the
SpyIntel [72]

Answer:

i think it's main menu!

Explanation:

when your on the main menu , you find everything your looking for or what it is you need to go too because ur on the home page! let me know if this helped!

7 0
3 years ago
Read 2 more answers
A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
AnnyKZ [126]
You have a raspberry pi connected to all the sensors and a code running to  trigger if the sensors are triggered. Each sensor and keypad would run to a different input on the pi. They should al be able to be powered with a single cell lipo. Is that what you are asking?
5 0
3 years ago
Write a java program as follows Write a method called powOfTwo that takes an integer as parameter, computes, and outputs it’s sq
Kisachek [45]

Answer:

public static int powOfTwo(int input) {

 return input*input;

}

You will have to call this method in main
for printing it, write

System.out.println(powOfTwo(your number));

in public static void main(str[]args) {

}

8 0
2 years ago
Other questions:
  • After reading passage “the incredible machine” why do you think the article has been titled so?
    13·1 answer
  • What is a preemptive CPU scheduling algorithm? Give an example and explain.
    7·1 answer
  • What cannot be performed using windows task manager
    10·1 answer
  • The function of network switch is to _____.
    5·1 answer
  • Which daemon manages the physical memory by moving process from physical memory to swap space when more physical memory is neede
    14·1 answer
  • What is the Internet?
    5·2 answers
  • Who here has a crush on jk from bts but feels more mature than him
    10·2 answers
  • Which of these does an operating system use to organize files?
    7·2 answers
  • Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning
    14·1 answer
  • What is the earliest age you can collect social security.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!