Cloud Computing
Explanation:
1.Cloud computing allows employees to be more flexible in their work practices. For example, you have the ability to access data from home, on holiday, or via the commute to and from work (providing you have an internet connection).
2.Network capabilities are extended without requiring investment in new infrastructure, personnel, or software. Technology is integrated into every-day appliances allowing them to interconnect with other devices, making them more 'smart' or automated.
3.Cloud computing benefits
- Efficiency / cost reduction. By using cloud infrastructure, you don't have to spend huge amounts of money on purchasing and maintaing equipment.
4.Cloud environments promise several benefits such as reduced expenses and simplicity to ser- vice providers and service requesters [Foster et al. ... 2010], trust management and security are ranked among the top 10 obstacles for adopting cloud computing
In this exercise we have to use the knowledge in computational language in python to write a code with circles and squares.
<h3>how to draw geometric figures in python?</h3>
<em>inputs = 100</em>
<em>radius</em>
<em> draw_circle(radius);</em>
<em> pendown()</em>
<em> begin_fill()</em>
<em> circle(radius)</em>
<em> end_fill()</em>
<em> penup()</em>
<em>left(90)</em>
<em>forward(radius*2)</em>
<em>right(90) </em>
<em>penup()</em>
<em>setposition(0,-200)</em>
<em>color("gray")</em>
<em>bottom_radius = int(input("What should the radius of the bottom circle be?: "))</em>
<em>draw_circle(bottom_radius)</em>
<em>draw_circle(bottom_radius)</em>
See more about python at brainly.com/question/18502436
Answer:
The main concept of the defense in depth is that the various defensive mechanism series are used for protecting the data and the information in the system. This approach is basically used multiple layers to control the cyber security. It also mainly provide the redundancy for controlling the security failure in the system.
The detection in depth basically provide the redundant overlapping approach and it is used for detecting the security and also accomplish the response that are available in the security detection.
Software to damage computers
The answer is Tailoring the baseline to their needs.
After an organization selects applicable security control baseline but finds not all of the controls apply, it initiates a tailoring process to modify the controls appropriately and more closely with specific conditions related to organizational missions, information systems or environments of operation. It is an integral part of the security control selection and specification and involves risk management processes like assessing, responding to, and framing.