1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katen [24]
3 years ago
8

In this scenario, hackers launch cyber-attacks that affect several parts of the nationâs financial infrastructure over the cours

e of several weeks. Specifically, sensitive credit card processing facilities are hacked and numbers are released to the Internet, causing 120 million cards to be canceled; automated teller machines (ATMs) fail nearly simultaneously across the nation; major companies report payroll checks are not being received by workers, and several large pension and mutual fund companies have computer malfunctions so severe that they are unable to operate for more than a week. Identify the countermeasures that need to be implemented to prevent these cyber attacks from occurring in the future.
Computers and Technology
1 answer:
pentagon [3]3 years ago
6 0

Answer:

The counter measures that need to be implemented to prevent cyber attacks from occurring in the future are (1) By implementing an enterprise wide security policy. (2)designing a breached network.

Explanation:

Each day in the world of technology getting to it's height years and day by each day a new technology gadgets are been released. in the same way, the threats of getting attacked by hackers are also on the rise by the day.

These days the cyber cells are quite very sensitivities in based on the cases of getting attacked and the ATM machines are also one of the systems that can be hacked so in order to stop this from occurring, the Technology teams and cyber cells should have taken some counter or preventive measures as there are many of them. in this case we are discussing some of these as measures which is given below:

  • Implement the enterprise wide security policy: A good security policy plays a vial role in the protection from hacking  for any bank as the IT team just has to maintain a pure modification or preventive security system. this  will help the data Implement the enterprise wide security policy: As a good security strategy plays a vital role in the protection from hacking  for any bank as the IT team just has to maintain a pure preventive security system. As It will help the people data to be protected . As the bank’s systems find the technique or tool for a network to work with lower risk.
  • Making a breached network:  when an actual network breaching is carried out, the network segmentation can be realized through by making different network zones, different limits as in this way the expertise for a hacker will be lessened and he will have to compromise by leaving it.
You might be interested in
in a stop-and-wait arq system, the bandwidth of the line is 1 mbps, and 1 bit takes 10 ms to make a round trip. if the system da
MArishka [77]

Answer:

٢٣٤

Explanation:

5 0
2 years ago
Pre-made, copyright-free illustrations are called __________. apps clip art graphic design stock photos
IceJOKER [234]

Answer: clip art

Explanation:

  • The clip arts are graphic images that are pre-made illustrations for the purpose of creating any medium (designs or art).
  • It has no restrictions to use them, it can be used by anyone, hence its copyright-free.
  • It comes in both electronic and printed form.
  • But mostly they are designed and distributed and used by a person in an electronic form.

Hence, the complete statement is "Pre-made, copyright-free illustrations are called <u>clip art</u>".

7 0
3 years ago
You interact with a program through which of the following, thereby controlling how you enter data and instructions and how info
kaheart [24]

Answer:C)User interface

Explanation: User interface(UI) is the interaction phase of the user or programmer with the computer system and network. This phase helps the user to connect with the operating system function and let them process it according to the requirement. Example-monitor , keyboard, mouse etc.

Other options that are given are incorrect because operating system is the system that is part of the interface , information is the data and storage is for the storing of data,.Thus the correct option is option(C)

4 0
3 years ago
Read 2 more answers
Look at the logic program below. Set a breakpoint after each commented instruction. You can also single step through the program
Goshia [24]

Using programming knowledge, it is possible to use programming logic, we can differentiate and find the terms

<h3>Writing the code and understanding the programming logic:</h3>

<em>.data</em>

<em>sourceword:</em>

<em>.word 0xAB</em>

<em>wordmask:</em>

<em>.word 0xCF</em>

<em>operand:</em>

<em>.long 0xAA</em>

<em>.text</em>

<em>.globl _start</em>

<em>_start:</em>

<em>movw sourceword, %ax # ax=0x00AB ( move the word value of sourceword =0x00AB to ax register.)</em>

<em>movw %ax, %bx # bx=0x00AB ( copy the value of ax to bx register.)</em>

<em>xorw %cx, %cx # cx=0000 ( cx=cx XOR cx, that is clear cx register.)</em>

<em />

<em>andw wordmask, %ax # ax=0x008B ( ax=ax AND wordmask= 0x00AB AND 0x00CF= 0x008B)</em>

<em>orw wordmask, %bx # bx=0x00EF (bx=bx OR wordmask= 0x00AB OR 0x00CF= 0x00EF.)</em>

<em>xorw wordmask, %cx # cx=0x00CF (cx=cx XOR wordmask= 0x0000 XOR 0x00CF=0x00CF.)</em>

<em />

<em>movl operand, %eax # eax=0x000000AA. ( copy the 32-bit value of operand=0x000000AA to eax.)</em>

<em>movl %eax, %ebx # ebx=0x000000AA.( copy the value of eax to ebx.)</em>

<em>movl %eax, %ecx # ecx=0x000000AA. ( copy the value of eax to ecx.)</em>

<em />

<em>shll $3,%eax # eax=0x00000550. ( logical shift left of eax=0x000000AA by 3 bits.)</em>

<em />

<em># 0x000000AA=00000000000000000000000010101010</em>

<em />

<em># =>00000000000000000000010101010000=0x00000550.</em>

<em />

<em>rorl $4,%ebx # ebx=0xA000000A. (Rotate right ebx=0x000000AA by 4 bits.)</em>

<em />

<em># 0x000000AA=00000000000000000000000010101010</em>

<em />

<em>3 =>10100000000000000000000000001010= 0xA000000A.</em>

<em />

<em>sarl %ecx # here the count value to shift the bits not mentioned.</em>

<em />

<em># It is the arithmetic shift right instruction. the shifted left bits filled with MSB bit.</em>

See more about logic program at brainly.com/question/14970713

#SPJ1

5 0
2 years ago
Why is it grey? i recently dropped it , the switch is on!
iragen [17]

Answer:

because it is what it is

7 0
3 years ago
Other questions:
  • True or False. It is required to restart the client computer after the DLP agent has been installed.
    9·2 answers
  • Which of the following is a justification for giving a Page Quality (PQ) rating of Lowest? Select all that apply. True False The
    7·1 answer
  • An example of how a merge field will appear in a document is ______.
    7·2 answers
  • Who is responsible for customer service?
    14·1 answer
  • What are static components in a multimedia system?
    15·2 answers
  • i have a class for computers and i need a free hardrive are there any websites that give me one for free in 3 days??​
    15·1 answer
  • What<br>are<br>the features of secondary storage media​
    13·2 answers
  • You decide to test an audio clip that you have inserted into your presentation, but before you do that you make sure that the co
    6·1 answer
  • TOT al<br>Name TWO examples of these settings and utilities. (2)​
    12·1 answer
  • Define technical writing. The proposal introduces the ……. (5 Mark)
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!