1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weqwewe [10]
3 years ago
10

The organization will most likely ___ to an internal user attempting to escalate privilege than to an external hacker

Computers and Technology
1 answer:
alexdok [17]3 years ago
8 0

Answer:

respond differently.

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.

Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.

An organization is expected to most likely respond differently to an internal user such as one of its employees that attempt to escalate his or privilege than to an external hacker.

This is usually so because the organization trust its internal users to an extent than it does with external users or an attacker such as an external hacker.

You might be interested in
. Differentiate between Radio waves and Microwaves
ankoles [38]
Well you listen to a radio and you put food in a microwave
7 0
4 years ago
Why was the microchip essential to improving computers?
-BARSIC- [3]
Because it downsized the scale of the computer itself.

5 0
3 years ago
Which of the following views is the best view to use when setting transition effects for all slides in a presentation?
alexgriva [62]

Answer:

Slide sorter view

8 0
3 years ago
Read 2 more answers
According to Manny experts how often show files be backed up
timama [110]
They should be backed up every single day as loss of data could mess up certain machines
5 0
3 years ago
A dropped packet is often referred to as a _____________.
rjkz [21]
The answer to this question is the "connection oriented sessions", this is also referred to us as dropped packet where the packet contains a lot of information. When packet sent, we need to check for delivery and when the packet is being dropped we need to resend it and repeat the procedure.
3 0
3 years ago
Other questions:
  • What is the definition of online communication
    15·1 answer
  • Given an char variable last that has been initialized to a lowercase letter, write a loop that displays all possible combination
    10·1 answer
  • Clicking on this will minimize all open windows.
    5·2 answers
  • What is this file used for
    15·2 answers
  • What do you think the need for so many different form factors and server types are?
    13·1 answer
  • Which group contains the command to manually conduct a spell check ?
    9·1 answer
  • Name 2 ways that body temperature can be taken.​
    11·1 answer
  • Which browser feature will delete your history, cache, and cookies the moment you close the special window
    6·1 answer
  • How important are operating system in our devices?​
    11·2 answers
  • (03.02 LC)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!