My life career in computer science
It does look like a model
Hope it helps I mean just my opinion.
Answer:
The answer is "DDoS
"
Explanation:
The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.
- This attack is aimed to avoid legal customers of one's website from accessing it.
- In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with.
- One other way to successfully attack is to send fake requests from the attacker.
Answer:
I do Stray kids and Tower Of God is good combo mannnn
Answer
1. Assemble his team
2. Find reason for breach
3. Evaluate what was lost
4. Ensure password change
Explanation:
In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.
Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.
In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.
The CISO has to ensure that all employees are trained properly on security and they comply to security policies.