1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svlad2 [7]
3 years ago
10

Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how

you could implement that particular policy to prevent an attack: 1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption.
Computers and Technology
1 answer:
GenaCL600 [577]3 years ago
7 0

Explanation:

Tech companies focus on making advancement in technology products and services. They are driven by innovations and the use of technology to make them standout from other companies.  They uses technology to render services.

Cyber attack is a deliberate attack on companies' computers or on an individual computer with the intention of stealing information, or other reasons without victim approval.

How policies on encryption could be implemented to prevent cyber attacks by:

Cyber security policies explain the guidelines on how organization staffs and end-users access online applications and internet resources without fear of security details being hacked.

1. Rules should be set on how to use email encryption: This rule should be easy to read. Emails should be encrypted to provide safety from cyber attacks. Contents should not be visible, should only be visible to those sending and receiving such emails.

2. Rules on encryption of sensitive messages and back up data.

3. rules on encryption of Log in details and passwords

You might be interested in
Why are abbreviations like BRB, TBH, and IDK appropriate in some situations but not in others?
Y_Kistochka [10]

Dont talk in abbreviations to elders, most of them might not know what that means and youll likely have to teach them

7 0
3 years ago
Read 2 more answers
Continuing with the carpet example, you devise a set of steps, or a(n) , to solve the problem. You then use a programming langua
Orlov [11]

Answer:

i) an instruction set, ii) pseudocode

And program in python is:

LENGTH=input("ENTER THE LENGTH OF THE ROOM IN FEET")

BREATH=input("ENTER THE  BREATH OF THE ROOM IN FEET")

AREA=int(LENGTH) * int(BREATH)

print("THE AREA OF THE ROOM IN SQUARE YARDS IS", AREA/9)

print("THE CARPET REQUIRED IN SQUARE FEET",AREA)

Explanation:

The pseudo code is:

START

ENTER THE LENGTH OF THE ROOM IN FEET; LENGTH

ENTER THE BREATH OF THE ROOM IN FEET; BREATH

PRINT THE AREA OF THE ROOM IN SQUARE FEET IS; AREA

PRINT THE AREA OF THE ROOM IN SQUARE YARDS IS; AREA/9

PRINT THE CARPET REQUIRED IN SQUARE FEET; AREA

STOP

6 0
3 years ago
Does the game best fiends use data?
Margaret [11]
<span>The game Best Fiends does not need wifi when playing therefore it will not consume your data. This app is about little animals of Minutia lived in peace and concordance, until the night the meteor crushed into Mount Boom! An interesting power changed the vile Slugs who lived there into a group of greenery-eating goons – and now, the Slugs caught the Best Fiends' families!</span>
6 0
3 years ago
I need answer poooo<br>​
Fiesta28 [93]

Answer:

what is this?Are yhere any options for this question ❓

7 0
3 years ago
A business would use a website analytics tool for all of the following EXCEPT _____.
BaLLatris [955]

Answer:

C. viewing why someone visited your webpage

Explanation:

Website analysis often referred to as Web analytics is a term that is used to describe a form of website distribution, activity, and proportion relating to its performance and functionality.

Some of the things Web analytics does include the following:

1.  measures the number of pages a user or visitor viewed or assessed

2.  counts the number of new and returning visitors

3.  helps website administrator to know when to increase bandwidth

Hence, in this case, the correct answer is option C. viewing why someone visited your webpage

4 0
3 years ago
Other questions:
  • Q) Select the two obstacles for data parsing
    5·2 answers
  • Each processor or core processes two threads at the same time is called _________.
    5·1 answer
  • Why was the internet originally constructed
    5·1 answer
  • How would a static local variable be useful?
    5·1 answer
  • Write a program that lets the user enter a nonnegative integer then uses a loop to calculate the factorial of that number. Displ
    11·1 answer
  • When a CPU executes each instruction in a program, it uses a process known as the __________.
    15·1 answer
  • Which type of image would require you to obtain permission from the author to use the image and possibly pay a royalty to the au
    12·1 answer
  • You're the administrator for a large bottling company. At the end of each month, you routinely view all logs and look for discre
    8·1 answer
  • Suppose the CashRegister needs to support a method void undo() that undoes the addition of the preceding item. This enables a ca
    6·1 answer
  • Can you answer this ?​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!