1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katen [24]
4 years ago
8

In this scenario, hackers launch cyber-attacks that affect several parts of the nationâs financial infrastructure over the cours

e of several weeks. Specifically, sensitive credit card processing facilities are hacked and numbers are released to the Internet, causing 120 million cards to be canceled; automated teller machines (ATMs) fail nearly simultaneously across the nation; major companies report payroll checks are not being received by workers, and several large pension and mutual fund companies have computer malfunctions so severe that they are unable to operate for more than a week. Identify the countermeasures that need to be implemented to prevent these cyber attacks from occurring in the future.
Computers and Technology
1 answer:
pentagon [3]4 years ago
6 0

Answer:

The counter measures that need to be implemented to prevent cyber attacks from occurring in the future are (1) By implementing an enterprise wide security policy. (2)designing a breached network.

Explanation:

Each day in the world of technology getting to it's height years and day by each day a new technology gadgets are been released. in the same way, the threats of getting attacked by hackers are also on the rise by the day.

These days the cyber cells are quite very sensitivities in based on the cases of getting attacked and the ATM machines are also one of the systems that can be hacked so in order to stop this from occurring, the Technology teams and cyber cells should have taken some counter or preventive measures as there are many of them. in this case we are discussing some of these as measures which is given below:

  • Implement the enterprise wide security policy: A good security policy plays a vial role in the protection from hacking  for any bank as the IT team just has to maintain a pure modification or preventive security system. this  will help the data Implement the enterprise wide security policy: As a good security strategy plays a vital role in the protection from hacking  for any bank as the IT team just has to maintain a pure preventive security system. As It will help the people data to be protected . As the bank’s systems find the technique or tool for a network to work with lower risk.
  • Making a breached network:  when an actual network breaching is carried out, the network segmentation can be realized through by making different network zones, different limits as in this way the expertise for a hacker will be lessened and he will have to compromise by leaving it.
You might be interested in
Briefly explain how developers use a distributed version management system. You may assume that a master repository has been set
Akimi4 [234]

Answer:

Using version control tools like Git and Github.

Explanation:

Version control is a vital tool in programming in recent times. it helps to prevent loss of source codebase and creating unwanted folders for storing multiple codebases to prevent excess storage usage and time consumption.

Git and Github is a platform that handles version control and collaboration between co-workers. When a repository is created, its initial branch is called the master branch and when a staged code is committed, the commit is recorded. These records can be retrieved using the commit hash value and resetting the current unstaged file or code. A new branch can created to hold a different version of an application and merged later with the master branch.

4 0
3 years ago
Make these negative sentences more positive and polite. Keep the meaning.
mart [117]

Answer:

You should not run for the bus. You could slip on the ice and fall

Would you stop telling me what you can't do

Could you not eat with your mouth open

You should not submit an incomplete report

6 0
3 years ago
Read 2 more answers
Outlines help you visualize the slides and the points you will include on each slide.
kvv77 [185]
I don’t know I think true
6 0
3 years ago
Anyone 13 i a boy 13 pan
Setler [38]

Answer:

RATED- SUS

Explanation:

4 0
3 years ago
Read 2 more answers
In a database the primary key must contain?
lakkis [162]

Answer:

A field with a unique value

Explanation:

A primary key is a field (or a collection of fields) that contain a unique data to identify a precise row in a given table.  This is used for data retrieval but also to fully identify the row to be edited in case of update.

It can be as simple as an auto-increment counter, a serial number or an email address for example.

It can also be complex and take into account a series of fields, like a combination of a date and a userID, as a simple example.  In such case, the date field by itself would occur many times (many entries per day), and the userID would happen also many times (many daily entries by the userID), but the pair (date/userID) would be unique.

6 0
4 years ago
Other questions:
  • What naming scheme identifies the rows in a worksheet?
    5·2 answers
  • This career involves answering questions about computer parts and trouble shooting broken computers? Video game designer, comput
    10·1 answer
  • ___________ is produced by propulsion systems or engines.
    6·1 answer
  • Mary needs to choose the _____ menu in order to place the text in a desirable fashion around the image
    12·2 answers
  • After you save a table, the new table name appears ____.
    12·2 answers
  • Write a program to accept two numbers<br>in two lines and find Square root of Squares<br>of thion​
    13·1 answer
  • Sorting Records in a Form
    12·1 answer
  • Whenever I rate an answer to a question, it says so and so finds it helpful. It's always the same people that they say find it h
    10·1 answer
  • Which button is not present in the font group Home tab?<br> -B<br> -U<br> -I<br> -D
    7·2 answers
  • Which one of the following document types would you not use the Microsoft Excel program to create?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!