1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
6

Note oj cyber security​

Computers and Technology
1 answer:
dybincka [34]3 years ago
7 0

Answer:

The answer to this question is given below in this explanation section.

Explanation:

                               "cyber security"

cyber security refers to the body of technologies,Processes and practices designed to protect networks,devices,programs and data from attack,damage or unauthorized  access.Cyber security may also be referred to as information technology security.

Importance:

                         Cyber security is important because government financial and medical organization collect process and store unprecedented amounts of data on computer and other devices.A significant portion of that data can be sensitive information,whether that be intellectual property financial data personal information or other type of data for which unauthorized access or exposure could have negative consequences.organizations transmit sensitive data across network and to other devices in the course of doing business,and cyber security describes the discipline dedicated to protecting that information and the systems  use to process or store it.

Challenges of cyber security:

                  For an effective cyber security an organization needs to coordinates its effort throughout its entire information systems.Elements of cyber components all the following:

  • Network security
  • Application security
  • Endpoint security
  • Data security
  • Identity management
  • Database and infrastructure security
  • cloud security
  • Mobile security

Managing cyber security:

            The national cyber security alliance,through recommends a top down  approach to cyber security in which corporate management leads the change in prioritizing cyber security management across all business practices. NCSA advises that companies must be prepaid to response to the inevitable cyber incident restore normal operations,and ensure that company assets and the company reputation are protected.

You might be interested in
During a test, it is generally best to: A. answer all questions in order B answer the essay questions first C. answer the least
Alecsey [184]

C. answer the least challenging questions first

because then you get those out of the way and have more time to focus on the harder questions.

5 0
3 years ago
Read 2 more answers
_____ is a function performed by control programs that manages computer resources, such as storage and memory.
Fudgin [204]
Resource allocation is a function performed by control programs that manages computer resources, such as storage and memory. It is necessary for any application to be run on the system because the computer is required to allocate certain resources for it to be able to run once the user opens any program.


5 0
4 years ago
Which statement is false? Select one: a. A class is to an object as a blueprint is to a house. b. Classes are reusable software
kow [346]

Answer:

A class is an instance of its object

Explanation:

6 0
3 years ago
Select the word or phrase from the drop-down menu to complete each sentence. File names consist of a ______ and a file extension
Law Incorporation [45]

Answer:

base file name, file format, bitmap image

Explanation:

8 0
3 years ago
Researchers conducted a 'natural experiment' to examine the effects of on-site food services on weight gain among first-year col
anygoal [31]

Answer:

On-site food services is the INDEPENDENT variable and the weight gain is the DEPENDENT variable

Explanation:

Variables can be dependent or independent. An independent variable is the one used by the researcher to test its degree of influence on the dependent variable. The dependent variable, as the name implies, relies on changes in the independent variable to effect its own changes.

In the question, it is obvious that weight gain among the first year students is dependent on on-site food services

7 0
3 years ago
Other questions:
  • Read the spreadsheet formula below, then answer the question.
    14·2 answers
  • Where does the term for a star network describe? A) a network for Department of Defense scientists to share data about the stars
    13·2 answers
  • After clicking the Start button on your computer screen desktop, what option would you then select to examine system components
    10·2 answers
  • How is a correction made to an Electronic health record?
    14·1 answer
  • Translation of a file into a coded format that occupies less space than the original file is called
    15·1 answer
  • Write two cin statements to get input values into birthMonth and birthYear. Then write a statement to output the month, a dash,
    7·1 answer
  • Why do we use a design process?
    13·2 answers
  • A computer is performing a binary search on the sorted list of 7 numbers below. What is the maximum number of iterations needed
    15·1 answer
  • What is your favorite song? mine is "In the final"
    7·2 answers
  • What is output by the following code?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!