1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sasho [114]
3 years ago
11

Chapter 15 Problem 6 PREVENTIVE CONTROLS Listed here are five scenarios. For each scenario, discuss the possible damages that ca

n occur. Suggest a pre-ventive control. a. An intruder taps into a telecommunications device and retrieves the identifying codes and personal identification numbers for ATM cardholders. ( The user subsequently codes this information onto a magnetic coding device and places this strip on a piece of cardboard.) b. Because of occasional noise on a transmission line, electronic messages received are extremely garbled. c. Because of occasional noise on a transmission line, data being transferred is lost or garbled. d. An intruder is temporarily delaying important strategic messages over the telecommunications lines. e. An intruder is altering electronic messages before the user receives them.
Computers and Technology
1 answer:
sineoko [7]3 years ago
7 0

Answer: seen below

Explanation:

There are various solution or ways to go about this actually. In the end, curtailing this is what matters in the end.

Below i have briefly highlighted a few precise way some of this problems can be solved, other options are open for deliberation.

A. Digital encoding of information with the calculation being changed occasionally, particularly after the frameworks advisors have finished their employments, and the framework is being used.

Which can also mean; The money could be withdrawn form the ATM. preventive Control is password to be changed periodically and regularly.

B. Noise on the line might be causing line blunders, which can bring about information misfortune. Reverberation checks and equality checks can assist with recognizing and right such mistakes.

C. If information is being lost, reverberation checks and equality checks ought to likewise help; notwithstanding, the issue might be that an intruder is blocking messages and altering them. Message arrangement numbering will assist with deciding whether messages are being lost, and in the event that they are maybe a solicitation reaction strategy ought to be executed that makes it hard for gatecrashers to dodge.

D. In the event that messages are being postponed, a significant client request or other data could be missed. As in thing c, message arrangement numbering and solicitation reaction methods ought to be utilized.

E. Messages modified by intruders can have an extremely negative effect on client provider relations if orders are being changed. For this situation, information encryption is important to keep the gatecrasher from perusing and changing the information. Additionally, a message succession numbering strategy is important to ensure the message isn't erased.

cheers i hope this was helpful !!

You might be interested in
Jackson is teaching a class the concept of the binary number system. Which term will he use to refer to the leftmost bit of a bi
storchak [24]
A. most significant bit
5 0
3 years ago
What component has the job of managing data as it flows into and out of the places it needs to go?
kompoz [17]
Memory controller. ......
3 0
3 years ago
Read 2 more answers
Which type of cable is described as a central conductor wire that is surrounded by insulating materials and placed inside a brai
Elan Coil [88]
<span>Which type of cable is described as a central conductor wire that is surrounded by insulating materials and placed inside a braided metal shield? A coaxial cable.</span>
3 0
3 years ago
What device brocasts all data packets to other nodes on a network?
katovenus [111]
Switch/Router is Broadcast 
8 0
3 years ago
10. Differentiate between equity share &amp; preference share.​
IrinaVladis [17]

Answer:

Equity Shares are commonly called Common shares and have both advantages and disadvantages over Preference shares.

  • Equity shareholders are allowed to vote on company issues while preference shareholders can not.
  • Preference shareholders get paid first between the two in the case that the company liquidates from bankruptcy.
  • Preference shareholders get a fixed dividend that has to be paid before equity share dividends are paid.
  • Preference shareholders can convert their shares to Equity shares but equity shareholders do not have the same courtesy.
  • Preference shares can only be sold back to the company while equity shares can be sold to anybody.

5 0
2 years ago
Other questions:
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • Which is most likely a presentation file?
    8·1 answer
  • In real-world environments, risks and their direct consequences will most likely span across several domains. However, in the la
    12·1 answer
  • Which is the biggest known issue specific to satellite Internet connections?
    13·2 answers
  • In general, smartphones do NOT hold as much personal information as tablets.
    11·1 answer
  • As marketing manager, you need to have ( blank) skills and (blank) skills.
    11·1 answer
  • Please choose the correct option please tell fast​
    9·1 answer
  • What is modularity?
    9·1 answer
  • Which are print settings that can be modified in word 2019 choose two answers​
    8·1 answer
  • Apply the Fill - Teal, Accent 4, Soft Bevel text effect (the 5th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!