1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
6

Note oj cyber security​

Computers and Technology
1 answer:
dybincka [34]3 years ago
7 0

Answer:

The answer to this question is given below in this explanation section.

Explanation:

                               "cyber security"

cyber security refers to the body of technologies,Processes and practices designed to protect networks,devices,programs and data from attack,damage or unauthorized  access.Cyber security may also be referred to as information technology security.

Importance:

                         Cyber security is important because government financial and medical organization collect process and store unprecedented amounts of data on computer and other devices.A significant portion of that data can be sensitive information,whether that be intellectual property financial data personal information or other type of data for which unauthorized access or exposure could have negative consequences.organizations transmit sensitive data across network and to other devices in the course of doing business,and cyber security describes the discipline dedicated to protecting that information and the systems  use to process or store it.

Challenges of cyber security:

                  For an effective cyber security an organization needs to coordinates its effort throughout its entire information systems.Elements of cyber components all the following:

  • Network security
  • Application security
  • Endpoint security
  • Data security
  • Identity management
  • Database and infrastructure security
  • cloud security
  • Mobile security

Managing cyber security:

            The national cyber security alliance,through recommends a top down  approach to cyber security in which corporate management leads the change in prioritizing cyber security management across all business practices. NCSA advises that companies must be prepaid to response to the inevitable cyber incident restore normal operations,and ensure that company assets and the company reputation are protected.

You might be interested in
Online transaction processing (OLTP) and online analytical processing (OLAP) are similar MIS strategies used to help with busine
Stels [109]

OLTP ( On-line Transaction Processing )

As the name suggests, this system is designed for handling transactions on web applications.

Examples include Banking system.

OLAP ( On-line Analytical Processing )

As per the name, this system is developed for analyzing and reporting functions for web applications.

These systems form a part of data warehousing.

Examples include data mining for Banking system.

OLTP databases undergo ETL operations to form a part of OLAP system. Data from several OLTP database are extracted as per the requirements, transformed ( formatted and cleaned ) to fit the OLAP requirements, and loaded into the OLAP system.

Similarities

• Both OLTP and OLAP are designed for online processing and support web based applications.

• In both systems, processing is done on large scale owing to their online presence.

Differences

• OLTP is designed to handle daily operation. OLAP is designed for decision support.

• OLTP supports data update and data insert operations. OLAP supports data analysis.

• OLTP supports insert, update and delete operations only. OLAP supports data extraction to support decision making process.

• Transactions form the source of data. Several OLTPs form the source of data.

• In OLTP, transactions are shorter in nature. In OLAP, transactions are longer.

• In OLTP, processing time is shorter. In OLAP, processing time is longer.

• Data modification queries are simpler. Data analysis queries are complex in nature.

• OLTP are normalized up to third normal form. OLAP are not normalized.

• Data in OLTP system are frequently modified. Data in OLAP systems are not frequently modified.

• OLTP should maintain data integrity. Data integrity in OLAP is unaffected.

• OLTP stores only current data. OLAP stores historical data.

• OLAP systems must have periodic back up. OLTP back up is achieved by reloading the databases.

The major differences are discussed above to clarify the functioning of both the systems.

8 0
3 years ago
The hardware that takes the input data and works with it
pogonyaev

Answer:

Examples of input devices include keyboards, mice, scanners, digital cameras and joysticks.

Explanation:

5 0
3 years ago
Before installing any software, it's always important to back up your system and to create a BLANK, which enables you to go back
g100num [7]
Whats the question supposed to be so I can answer it?
8 0
3 years ago
Read 2 more answers
What sort of technique would you use to sort 10,000 items using just 1000 available slot in your RAM?
beks73 [17]

Answer:

d. Merge sort

Explanation:

Merge sort is example of an efficient sorting alogrithm. The Divide and conquer rule is used in this technique. This method breakdown the list into multiple sublists and each sublist contains a single element. This technique merged in the form of sorted lists. This technique uses external memory of the system while sorting.

Merge sort is used to sort the 10,000 items using only 1,000 slots available in the RAM.

5 0
3 years ago
Atomic Term If an atom carries no charge, the positive charges from protons are balanced by the negative charges from the
Neko [114]

Answer:

yee ha

Explanation:

7 0
4 years ago
Other questions:
  • What’s of the following can be used to visually represent information similar to diagrams format painter Helens smart are a clip
    8·1 answer
  • What is the name of the intel technology that allows a processor to handle two threads at the same time?
    6·1 answer
  • What Coding program does UNITY use?
    6·1 answer
  • Does players report you on Mobile legends bang bang for playing your own Music while your playing yes or no
    11·1 answer
  • You have the following code: string name; cout << "Enter your name : "; cin >> name; If a user enters "Mary Smith" a
    10·1 answer
  • A vital step in maintaining an operating system is to regularly do what? Replace the hard drive. Organize the computer’s data. R
    11·2 answers
  • Assume that the variable data refers to the list [5, 3, 7]. Write the expressions that perform the following tasks: a. Replace t
    8·1 answer
  • Suppose you have a string matching algorithm that can take in (linear)strings S and T and determine if S is a substring (contigu
    11·2 answers
  • Whats worth more in adopt me- A Mega Owl or a Mega Frost Dragon?
    8·2 answers
  • Daily IT Question
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!