1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
3 years ago
15

A _____ is a systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity

that is a potential harm.
Computers and Technology
1 answer:
Ivan3 years ago
4 0

Answer:

Vulnerability assessment

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

A vulnerability assessment is a systematic and methodical evaluation used by network security experts to determine the exposure of network assets such as routers, switches, computer systems, etc., to attackers, forces of nature, or any other entity that is capable of causing harm i.e potential harms. Thus, vulnerability assessment simply analyzes and evaluate the network assets of an individual or business entity in order to gather information on how exposed these assets are to hackers, potential attackers, or other entities that poses a threat.

You might be interested in
Who would use a magnetic hard drive? Give a scenario and include examples as well as detail.
dybincka [34]
A magnetic hard drive well all hardrives have a magnet n them id say if it was to withstand heat so it whould stay on the magnet therefore not compromising the data <span />
3 0
4 years ago
Name the hardware component that performs each of the following functions (1) performs calculation and/or comparisons (2) holds
mariarad [96]
1. The CPU (central processing unit) does the calculations and comparisons that make the computer work. They use millions of transistors to do so.
2. The ROM holds all the programs on the computer. This is most often the "C" drive.
3. The ROM also has the operating system that is used to run the computer.
6 0
3 years ago
Use the writeln() method of the document object to display the current platform in a tag in the webpage. Hint: The platform prop
Allisa [31]

Using the knowledge in computational language in JAVA it is possible to write a code that the document object to display the current platform in a tag in the webpage

<h3>Writting the code in JAVA:</h3>

<em> <TABLE></em>

<em>      <ROWS> </em>

<em>      <TR> </em>

<em>      <TD>Shady Grove</TD></em>

<em>      <TD>Aeolian</TD> </em>

<em>      </TR> </em>

<em>      <TR></em>

<em>      <TD>Over the River, Charlie</TD></em>

<em>      <TD>Dorian</TD> </em>

<em>      </TR> </em>

<em>      </ROWS></em>

<em>      </TABLE></em>

<em>    </em>

<em />

See more about JAVA at brainly.com/question/12975450

#SPJ1

3 0
3 years ago
To open the find and replace dialog box with shortcut keys, hold down ctrl and press ________
ratelena [41]
Hi. To open the find and replace dialog box with shortcut keys, hold down CTRL and press the letter "H". 

Hope this helps.
Take care.
8 0
4 years ago
julie was just hired to conduct a security assessment of dion training’s security policies. during her assessment, she noticed t
Tasya [4]

An Increase in individual accountability is the improvement that this recommended action will provide for the company.

<h3>What is the aim of the training’s security policies improvement?</h3>

In order to adequately provide accountability, the use of shared or group accounts should be disabled and this allows you to log and track individual user actions based on their individual user accounts.

Also, it will enables the organization to hold users accountable for their actions, too.

Therefore, the Increase in individual accountability is the improvement that this recommended action will provide for the company.

Read more about security policies

brainly.com/question/28165644

#SPJ4

3 0
1 year ago
Other questions:
  • Suppose you wish to write a method that returns the sum of the elements in partially filled array. Which is the best choice for
    6·1 answer
  • The read/write heads of a hard disk gently rest on the hard disk platters in order to read and write the data.
    13·1 answer
  • What is the recommended procedure for disconnecting an external hard drive to avoid losing data?
    15·1 answer
  • Regular languages are closed under complement. True False
    7·1 answer
  • Which programming language was released first
    7·1 answer
  • What is the action take to the input called?
    15·1 answer
  • Compute series multiplier resistors RM = 100Ω:
    8·1 answer
  • Examine the weather map.
    12·2 answers
  • Free points <br><br><br><br><br> also if u wanna check out my spotlfy u can (xkuromist)
    6·2 answers
  • Why is computer called and information processing machine​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!