1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blondinia [14]
3 years ago
9

A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order

to alert them of the security breach. How should Data-Time Inc. manage this breach in security
Computers and Technology
1 answer:
Novosadov [1.4K]3 years ago
3 0

Incomplete question. Here's the full question:

Data-Time Inc. is a company that manages databases for a large city in Colorado. Included in these databases is information collected from the city’s homeless shelters and free clinics. Specifically, the databases contain personal information of the users of these services over the past 10 years; this includes people’s Social Security numbers and health records.

This data is highly secure and only accessible to the employees of Data-Time Inc. Employees are given a laptop when they are hired which allows them to access the database remotely. Unfortunately, one of these laptops is stolen and the security of the database is compromised.

A majority of the people whose information was compromised are homeless; therefore there is no easy way to contact them in order to alert them of the security breach. How should Data-Time Inc. manage this breach in security?

<u>Explanation:</u>

Since the emphasis is not on reversing the breach that has occurred, but on managing the level of security damage that could occur, it is important measures are directed towards preventing unauthorized access to sensitive information.

For example, the Media Access Control Address (MAC address) of the laptop if known could be greylisted from accessing the server that contains the sensitive information.

You might be interested in
Answer all 3 right an get 15 points 1. What is pinhole photography? 2. What are the three ways that a person can manipulate ligh
nekit [7.7K]

What is pinhole photography?  

A pinhole camera Doesn’t Have Lenses and reflects using light.  

What are the three ways that a person can manipulate light?

Reflection,Projection,and Refraction.

Explain why the image is projected upside down in a pinhole camera.

The light travels in a straight line, Which makes the picture upside down.  

Why did artists use pinhole cameras during the Renaissance?

It helped them make realistic looking paintings.

5 0
4 years ago
Write a program that echos back any inputted integer greater than 1, and exits when a 0 is entered. Your program should use a co
denpristay [2]

Answer:

MIPS Code:

.data

newline: .asciiz "\n" #newline variable

.text

MAINLOOP:

li $v0, 5 #syscall to get user interger and store in $v0

syscall

add $a0, $zero, $v0 #moving the user input to $a0 from $v0

beq $a0, 0, EXIT #branching to EXIT when $a0 is 0

li $v0, 1 #syscall to print integer in $a0

syscall

li $v0, 4 #syscall to print newline

la $a0, newline

syscall

j MAINLOOP #jumping to MAINLOOP

EXIT:

Sample Output:

6

6

7

7

3

3

0

7 0
3 years ago
Which IEEE standards define Wi-Fi technology?
Ratling [72]

Answer:

802.11 standards

4 0
4 years ago
Taylor is getting ready to send an e-mail. In three to five sentences, give Taylor some advice for sending an effective email.
KengaRu [80]

Answer:

  • Include subject lines since they are important
  • use bullet points
  • keep it short
  • avoid too many exclamation marks
  • watch your tone
3 0
3 years ago
It is considered good practice to save a presentation before printing it. true false
Ilya [14]
It is true because it is really a good practise to save a presentation before printing it

5 0
3 years ago
Other questions:
  • A method variable a class variable with the same name. a) acquiesces to b) destroys c) overrides d) alters
    14·1 answer
  • What components are in hard drives?
    12·1 answer
  • Your supervisor has asked you to set up a RAID hard drive array in a tower system, which has a motherboard that uses the B360 ch
    10·1 answer
  • Write a function that implements another stack function, peek. Peek returns the value of the first element on the stack without
    11·1 answer
  • You are installing a single 802.11g wireless network. The office space is large enough that you need three WAPs. What channels s
    10·1 answer
  • The objects that you place on master pages are called _____.
    6·1 answer
  • The InfoBar is located below the ribbon and on top of a message. It is used for which purposes? Check all that apply. showing th
    9·2 answers
  • How am i supposed to add subtitles to a video without have to waist money???
    7·1 answer
  • A)​What would be the state of the following list after each of the first four passes in a Bubble sort, sorting into ascending se
    5·1 answer
  • CISC vs RISC processors might be used, and come up with environments where one processor would outperform the other.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!