1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katen [24]
4 years ago
8

In this scenario, hackers launch cyber-attacks that affect several parts of the nationâs financial infrastructure over the cours

e of several weeks. Specifically, sensitive credit card processing facilities are hacked and numbers are released to the Internet, causing 120 million cards to be canceled; automated teller machines (ATMs) fail nearly simultaneously across the nation; major companies report payroll checks are not being received by workers, and several large pension and mutual fund companies have computer malfunctions so severe that they are unable to operate for more than a week. Identify the countermeasures that need to be implemented to prevent these cyber attacks from occurring in the future.
Computers and Technology
1 answer:
pentagon [3]4 years ago
6 0

Answer:

The counter measures that need to be implemented to prevent cyber attacks from occurring in the future are (1) By implementing an enterprise wide security policy. (2)designing a breached network.

Explanation:

Each day in the world of technology getting to it's height years and day by each day a new technology gadgets are been released. in the same way, the threats of getting attacked by hackers are also on the rise by the day.

These days the cyber cells are quite very sensitivities in based on the cases of getting attacked and the ATM machines are also one of the systems that can be hacked so in order to stop this from occurring, the Technology teams and cyber cells should have taken some counter or preventive measures as there are many of them. in this case we are discussing some of these as measures which is given below:

  • Implement the enterprise wide security policy: A good security policy plays a vial role in the protection from hacking  for any bank as the IT team just has to maintain a pure modification or preventive security system. this  will help the data Implement the enterprise wide security policy: As a good security strategy plays a vital role in the protection from hacking  for any bank as the IT team just has to maintain a pure preventive security system. As It will help the people data to be protected . As the bank’s systems find the technique or tool for a network to work with lower risk.
  • Making a breached network:  when an actual network breaching is carried out, the network segmentation can be realized through by making different network zones, different limits as in this way the expertise for a hacker will be lessened and he will have to compromise by leaving it.
You might be interested in
What data type can be used to hold any single character, including numbers and non-printing characters?
SVEN [57.7K]

Answer:

char

Explanation:

The character data type written as char holds any single character, numbers and non-printing characters. In java and most programming languages, the value of the character must be placed within single quotes. for example

char c = 'd'

char c = '9'

char c = '\t'

Are all valid declarations of a variable c as char and assigned d, then 9 and then used with a non-printing character (tab ) with the escape sequence.

8 0
3 years ago
Read 2 more answers
What classes should I take in high-school for majoring in computer science?
Gala2k [10]

Answer:

Computer science are the disciplines that study information, computing and the applications or ecosystems where they are developed. It is a science that comes from applied mathematics and has 3 branches that are quite well known. On the one hand we have software engineering, secondly theory as such (primary study of algorithms and data, etc.) and finally the application of the amalgam of the first two, which end up resulting in disciplines such as big data, cybersecurity or computer security, machine learning, artificial intelligence, etc. However, we are talking about a very broad science with various branches of work. Technological advances that have improved the scope of education, now allow us to develop in specific skills and computer science is one of the macro careers that have benefited the most thanks to the diversity of subjects it encompasses. This is where the on-demand courses available on the edX platform come in. Computer scientists are in one of the best times for their career advancement. We invite you to be part of the technological development and information and computing technologies through online courses.

Explanation:

6 0
3 years ago
Index addressing is for traversing arrays.<br><br> True<br><br> False
valina [46]

Answer:

False.

Explanation:

Index addressing is not for only traversing the arrays but to also access the element,manipulate them.Though indexing is also used in traversing but it is not solely for that.Indexing in an array starts from 0 to size-1.

for example:-

We have an array a of size 10.So to access the element at position 6.We have to write.

a[5];

Manipulating it

a[5]=6;

8 0
4 years ago
In numerical methods, one source of error occurs when we use an approximation for a mathematical expression that would otherwise
Shtirlitz [24]

Answer:

The function in Python is as follows:

import math

import numpy as np    

def exp(x):

   mylist = []

   for n in range(10):

       num = (x**n)/(math.factorial(n))

       mylist.append([num])

   exp_approx = np.asarray(mylist)

   sum = 0

   for num in exp_approx:

       sum+=num

   return sum

Explanation:

The imports the python math module

import math

The imports the python numpy module

import numpy as np    

The function begins here

def exp(x):

This creates an empty list

   mylist = []

This iterates from 0 to 9

   for n in range(10):

This calculates each term of the series

       num = (x**n)/(math.factorial(n))

This appends the term to list, mylist

       mylist.append([num])

This appends all elements of mylist to numpy array, exp_approx

   exp_approx = np.asarray(mylist)

This initializes the sum of the series to 0

   sum = 0

This iterates through exp_approx

   for num in exp_approx:

This adds all terms of the series

       sum+=num

This returns the calculated sum

   return sum

3 0
3 years ago
Label provides the code that executes if no case label is matched ​
Ratling [72]

Answer:

In c/c++ it is <em>default</em>

7 0
3 years ago
Other questions:
  • What is difference between RAM and ROM?
    13·1 answer
  • In excel, a cell is referred to by its cell __________, which is the coordinates of the intersection of a column and a row. answ
    14·1 answer
  • What command do you type in the search box to access the command line intrface in windows?
    8·1 answer
  • people illegally download music over the internet although it's free it it is still illegal what do you choose to do? why
    11·1 answer
  • Assume hosts A and B are each connected to a switch Svia 100-Mbps links. The propagation delay on each link is 25μs. The switch
    15·1 answer
  • How can users open a shared worksheet if they do not have Excel installed on a computer? visit Microsoft’s website use Office365
    6·1 answer
  • When would you insert a merge field?
    10·2 answers
  • Item 3
    15·1 answer
  • Add me as a friend on Real pool 3D so we can play a round of pool!!!
    10·1 answer
  • (Synchronized threads) Write a program that launches 1000 threads. Each thread adds a random integer (ranging from 1 to 3, inclu
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!