1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andreev551 [17]
3 years ago
11

describe what measures should have been taken by the educational service and test preparation provider to avoid the security bre

ach
Computers and Technology
1 answer:
Mariulka [41]3 years ago
8 0

Incomplete question. Here's part of the missing question;

The EducationS Review, a fictional company, is hit with a data breach that is making headlines. The Olianas-based educational service and test preparation provider inadvertently exposed files of at least 100,000 students in various parts of the country through its Web site. News of the breach was made public on Tuesday morning by a report in the local newspaper.

The files were exposed after the company switched the Internet service providers earlier this year. The sensitive information, which included personal data such as names, birth dates, ethnicities, and learning disabilities, as well as test performance, were easily accessed through a simple Web search and were available for at least seven weeks, according to the report. None of the information was password protected and was intended only to be viewed by EducationS authors.

<u>Explanation:</u>

It is important to note that the company did not make the information password protected, which creates a vulnerability.

Measures 1: only those with authentication password should have been allowed to access the information.

Measures 2:  prior to switching to a new internet service provider, an information risk assessment should have been done to ensure information security.

You might be interested in
Bobby is investigating how an authorized database user is gaining access to information outside his normal clearance level. Bobb
Sveta_85 [38]

Answer:

Aggregate Function .

Explanation:

The aggregate function returns the single value of the entire column of the database management system. The Aggregate Function is used in the SELECT statement and the GROUP BY clause.  

The sum(),avg(), etc are some examples of Aggregate Function in the database with the help of aggregate function bobby gains the access to information above the usual clearance point. and summarizes the data.

7 0
4 years ago
A computer's hard disk drive holds 8 x 10^10 bytes of information. If Jill buys an extra memory stick that holds 5.1 X 10^8 byte
denis-greek [22]

Answer:

The computer will store 8.05 *10^10 bytes of information.

Explanation:

This is the same as saying that the computer will now have 80.51 Gigabytes ( 1gb = 1.000.000.000 bytes) of storage. In this case, the number is represented in its decimal form, and the previous one is displayed in Scientific Notation.

8 0
3 years ago
Write a method that draws a circle and a square that is centered in a DrawingPanel. The method will take in the width and height
Katarina [22]

Answer:

public static void drawGraphics (Graphics g, int width, int height) {

   int r = Math.round(width/2);

   int x = 45;

   int y = 30;

     g.setColor(Color.RED);

   g.fillRect(x, y, width, height);

   g.setColor(Color.BLUE);

   g.fillOval(Math.round(x/2), Math.round(y/2), r, r);

}

Explanation:

The Java method "drawGraphics" of the Graphics class accepts draws a square with the "fillRect()" method of the Graphics class object and at its center, a circular path is drawn as well.

3 0
3 years ago
Can someone help me with this 1 writing question?!! please!
Romashka-Z-Leto [24]
If the topic of what you will be writing is covered by the site produced by a reputable university, then you may use it as long as you include it in your paper for copyright purposes, like in your bibliography or footnotes in any case. Since the site is made from a "reputable" university and I emphasis the word in quoted marks, that it is legit and proven to be valid because a famous university will not try anything to squander their reputation, hence the issue of whether it is true or not has less doubt than any other site with no credentials. 

So, yes. You may use that option as long as the content is what you've been looking for. 
4 0
3 years ago
Read 2 more answers
Which term below refers to the overall design intended to convey an idea or feeling that is appealing to the site's target audie
xenn [34]

Answer:

What are the terms

Explanation:

6 0
4 years ago
Other questions:
  • Cameron wants to impress the owner of the company. He creates a graph that shows the improved productivity at the company over t
    13·2 answers
  • DSL signals travel over telephone lines using the 300 to 3300 Hz frequency range.
    6·1 answer
  • To add text into a SmartArt graphic, a user will need to _____.
    14·1 answer
  • How can I change it to accepted file types: .ppt, .pptx, .xls, .xlsx, .doc, .docx, .zip, .pdf, .accdb, .msg on Inkscape?
    15·2 answers
  • What are the benefits of using an ordered list vs. an unordered list? What are the costs?
    10·1 answer
  • Hi need help on this <br> what is cyberspace
    14·1 answer
  • Join my among us code<br> SHUHZF
    6·2 answers
  • Imagine Frankie has a computer with a full hard drive. She needs to create and save a new document, so she deletes a bunch of ol
    8·1 answer
  • If you delete search results, you will a. clear the history on the computer. b. delete files from our computer. c. modify the re
    14·1 answer
  • A citizen of any group has both _____ and _____.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!