1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svlad2 [7]
3 years ago
10

Tech companies prepare for cyberattacks using common cybersecurity resources. Select one of the resources listed and explain how

you could implement that particular policy to prevent an attack: 1. monitoring and assessment, 2. policies and controls, 3. hiring, 4. software, 5. firewalls, 6. authentication and access, 7. encryption.
Computers and Technology
1 answer:
GenaCL600 [577]3 years ago
7 0

Explanation:

Tech companies focus on making advancement in technology products and services. They are driven by innovations and the use of technology to make them standout from other companies.  They uses technology to render services.

Cyber attack is a deliberate attack on companies' computers or on an individual computer with the intention of stealing information, or other reasons without victim approval.

How policies on encryption could be implemented to prevent cyber attacks by:

Cyber security policies explain the guidelines on how organization staffs and end-users access online applications and internet resources without fear of security details being hacked.

1. Rules should be set on how to use email encryption: This rule should be easy to read. Emails should be encrypted to provide safety from cyber attacks. Contents should not be visible, should only be visible to those sending and receiving such emails.

2. Rules on encryption of sensitive messages and back up data.

3. rules on encryption of Log in details and passwords

You might be interested in
Identify the careers that require a college degree
Vikentia [17]
Doctor or teacher or an engineer

8 0
3 years ago
Which two features could be added to a game using an "if () then " block
mafiozo [28]

The two features could be added to a game using an "if () then " block are:

  • Using nested If Then blocks.
  • Checks the specific Bid quantity for the instrument.

<h3>What does the If Then block mean?</h3>

The If Then block is known to be the outputs one of  a given two values, that is as a result of  the value of a Boolean input.

Note that  the input value  is very important and as such, The two features could be added to a game using an "if () then " block are:

  • Using nested If Then blocks.
  • Checks the specific Bid quantity for the instrument.

Learn more about game  from

brainly.com/question/1786465

#SPJ1

3 0
2 years ago
List two items that are required to make a text file into a bash script.
Olenka [21]

Answer:

Explanation:

First a header is needed indicating which bash will be used (sh, zsh, bash, etc.), then it is necessary to change the file extension so that the system recognizes it as an executable file and no longer as text

6 0
3 years ago
40 points!!! Which of the following is a disadvantage of outsourcing?
mr Goodwill [35]

Answer:

c

Explanation:

I need 20 characters in my answer so tvcogct7zr7zuruzxicfficx7t8txr8zz8rz8rxt8c8tvyovoyb9h

8 0
3 years ago
Read 2 more answers
What is digital museum​
umka2103 [35]

Access hundreds of professional development resources for museum professionals. Museum professionals can benefit at any career stage from student to retiree. Student Membership. Industry Membership. Established Since 1906. Museum Memebership. 501(c)3 Nonprofit Org.

7 0
2 years ago
Read 2 more answers
Other questions:
  • An anthropologist may try to learn why and how a culture develops.<br><br> A.true<br> B.false
    13·1 answer
  • (1 consider the following function definition: int func(int x, double y, char u, string name { //function body } which of the fo
    7·1 answer
  • A type of Knowledge Management System is called
    5·1 answer
  • A(n) __________ item is a hardware or software item that is to be modified and revised throughout its life cycle
    10·1 answer
  • _________________ ___________________ is an encrypted code that a person, website, or organization attaches to an electronic mes
    9·1 answer
  • The add_prices function returns the total price of all of the groceries in the dictionary. Fill in the blanks to complete this f
    15·1 answer
  • You are reviewing the output of the show interfaces command for the Gi0/1 interface on a switch. You notice a significant number
    12·1 answer
  • Which heading size fits for the word headings​
    9·2 answers
  • WILL GIVE BRAINLIEST! 20 POINTS! PLZ HELP!
    14·2 answers
  • What free website can you record videos on, and edit them without money?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!