1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
6

Note oj cyber security​

Computers and Technology
1 answer:
dybincka [34]3 years ago
7 0

Answer:

The answer to this question is given below in this explanation section.

Explanation:

                               "cyber security"

cyber security refers to the body of technologies,Processes and practices designed to protect networks,devices,programs and data from attack,damage or unauthorized  access.Cyber security may also be referred to as information technology security.

Importance:

                         Cyber security is important because government financial and medical organization collect process and store unprecedented amounts of data on computer and other devices.A significant portion of that data can be sensitive information,whether that be intellectual property financial data personal information or other type of data for which unauthorized access or exposure could have negative consequences.organizations transmit sensitive data across network and to other devices in the course of doing business,and cyber security describes the discipline dedicated to protecting that information and the systems  use to process or store it.

Challenges of cyber security:

                  For an effective cyber security an organization needs to coordinates its effort throughout its entire information systems.Elements of cyber components all the following:

  • Network security
  • Application security
  • Endpoint security
  • Data security
  • Identity management
  • Database and infrastructure security
  • cloud security
  • Mobile security

Managing cyber security:

            The national cyber security alliance,through recommends a top down  approach to cyber security in which corporate management leads the change in prioritizing cyber security management across all business practices. NCSA advises that companies must be prepaid to response to the inevitable cyber incident restore normal operations,and ensure that company assets and the company reputation are protected.

You might be interested in
19. Fatigue can help improve your reaction time.<br> False<br> O True
polet [3.4K]
False. Fatigue slows reaction times which is why it is dangerous.
5 0
3 years ago
Read 2 more answers
Describe three perimeter intrusion detection systems and give an example of one that you have seen deployed either at work or an
dlinn [17]

Answer:

A perimeter intrusion detection system (PIDS) is a device or sensor that detects the presence of an intruder attempting to breach the physical perimeter of a property, building, or other secured area.

the use of buried sensor for perimeter intrusion detection system, becomes very popular due to the advantage of been a discreet or even an invisible detection system and avoiding the need to build an above-the-ground fence to protect the perimeter due to costs or environmental reasons

Explanation:

<em>Description of 3 systems:</em>

Barrier-Mounted :Fence Intrusion Detection System

PIDS deployed on or in conjunction with a fence or other physical barrier (e.g. DAS cable or other motion sensors mounted on a fence).

Ground-based or Below-ground :

PIDS deployed below ground (again a DAS cable can be used or pressure sensitive cable or electromagnetic field). These do not require a physical barrier.

Free-Standing

PIDS deployed above ground that do not need to be installed on or in conjunction with a physical barrier (e.g. bistatic microwave link).

Example of one PIDS system I have seen deployed in a familiar location is the ones at the prison which is a barrier mounted or some inairports that prevent small to cause harm to small animals.

4 0
3 years ago
Complete the sentence about a focusing technique.
Butoxors [25]

Answer:

Subjects with a lot of <u>Visuals </u>make focusing easier

Explanation:

Visuals contents make a subject more focusing and interesting for the students. Students can learn that courses easily that have more pictorial content. It is the famous quote that "A picture is better than thousand words to understand".

4 0
3 years ago
Write the steps for displaying multiple subtotal functions in excel.
Sloan [31]

We can display multiple subtotal functions in excel using the following steps.

<u>Explanation</u>:

Step1: Enter the data you want to add in the excel sheet.

Step2: Select the cell containing the data you want to add.

Step3: Click the Data Tab

Step 4: Now select the SUBTOTAL command in the outline group.

Step 5: An option called ATEACHCHANGEIN will be available.

Step 6: Now select the drop-down menu under that option.

Step 7: After selecting the drop-down menu to select the columns you want to use for the first level subtotals.

By following these steps, we can display multiple subtotal functions in excel.

3 0
3 years ago
When a defendant pleads guilty to one offense just to have another offense dropped, this is what type of plea bargain
uranmaximum [27]
<h2>Answer:</h2>

The answer is sentenced plea bargain

<h2>Explanation:</h2>

sentence bargaining occurs when a defendant agrees to plead guilty to the stated charge in return for a lighter sentence. Typically this must be reviewed by a judge, and many jurisdictions simply don't allow it. In sentence bargaining, they plead guilty agreeing in advance what sentence will be given; however, this sentence can still be denied by the judge.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program totake a depth (in kilometers) inside the earth as input data;compute
    15·1 answer
  • When you enter a two-digit year that is less than 30, Excel changes the year to _____. Question 7 options:
    7·1 answer
  • Which is a function of network media?
    11·2 answers
  • Which answer best describes an unsubsidized federal loan
    9·1 answer
  • What is the purpose of the chart feature in word?
    15·1 answer
  • How to turn a flash drive into a bluetooth adapter?
    13·1 answer
  • 1. Define a C++ function with the name evaluateBook. The function receives as one argument the name of the file to be processed
    13·1 answer
  • The Cursor is blinking in a white area on the Screen. This area where text will appear in the ____.
    10·2 answers
  • Nathaniel wanted to buy a microphone. He went to an electronics store and was told that there are actually two types of micropho
    13·2 answers
  • Being a part of an organization or giving back to the community is which rewards of work factor?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!