1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
3 years ago
10

The organization will most likely ___ to an internal user attempting to escalate privilege than to an external hacker

Computers and Technology
1 answer:
alexdok [17]3 years ago
8 0

Answer:

respond differently.

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.

Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.

An organization is expected to most likely respond differently to an internal user such as one of its employees that attempt to escalate his or privilege than to an external hacker.

This is usually so because the organization trust its internal users to an extent than it does with external users or an attacker such as an external hacker.

You might be interested in
Typing with capital letters and exclamation points in an e-mail is an example of
Aleks [24]
It's an example of a poorly written email, it looks like somebody is angry and yelling at you, these types of emails can be described as a poor etiquette.
3 0
3 years ago
Read 2 more answers
A Uniform Resource Locator (URL) consists of three separate parts: network protocol, host, and web browser.
FrozenT [24]
That is false. are you doing it on a computer course.                                             <span />
3 0
3 years ago
Read 2 more answers
Which type of network attack uses a fake IP address to send data packets from an unauthorized user to a network?
liq [111]
D. DoS. DoS is a way to potentially lag or even crash different types of servers ranging from as small as a simple website to bigger websites and video games servers.
6 0
4 years ago
Read 2 more answers
In his work for a new company, Byron found a flower material that he could use to manufacture dresses. In his career, Byron is m
bekas [8.4K]

I guess the correct answer is plant system pathway

Thе plant systеms pathway includеs οccupatiοns rеlatеd tο grοwing fοοd, fееd, and fibеr crοps, and thе study οf plantsand thеir grοwth tο hеlp prοducеrs mееt cοnsumеr dеmand whilе cοnsеrving natural rеsοurcеs and maintaining thе еnvirοnmеnt.

In his work for a new company, Byron found a flower material that he could use to manufacture dresses. In his career, Byron is most likely focused on the plant system pathway.


5 0
3 years ago
Read 2 more answers
In order for your laptop to make a wireless connection, it must first find an available __________ to connect to.
Nitella [24]
The answer is Service Set Identifier or SSID.

Every wireless router sends out a beacon signal to allow other devices such as laptops, wifi printers, personal cellphones when set to look for and connect to the routers SSID. This SSID can also be shut off or hidden from public domains so not every person stopping by can try to connect to the router via the SSID. Usually you must have a password to follow an attempt to connect to the exact wireless router.
3 0
3 years ago
Other questions:
  • Your computer has gradually slowed down. What's the most likely reason?
    8·1 answer
  • Can I change my brainly username?
    9·2 answers
  • How do you add a PDF assignment to google docs and be able to edit it?
    13·1 answer
  • Enter the answer.
    11·2 answers
  • What is a win-win situation?
    5·1 answer
  • Jim wants to buy a car, but he’ll probably only need it for a couple of years. He has a short commute to work, so he won’t be pu
    5·1 answer
  • All of the Internet in your country disappears. What happens next?
    13·1 answer
  • It is impossible to use a computer without a mouse. Is this statement true or false?
    10·1 answer
  • Question 1 of 10
    15·1 answer
  • A slide titled Alexander Graham Bell. There are 6 bulleted entries on the slide, and there is a lot of text on the slide. There
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!