1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liraira [26]
3 years ago
15

Compare and contrast two fundamental security design principles in network security. Analyze how these principles and how they i

mpact an organizations security posture.
Computers and Technology
1 answer:
forsale [732]3 years ago
5 0

Answer is given below :

Explanation:

Minimize attack surface area:

  • This area is often open to attackers due to the addition of features. For example, an unwanted text box in a web application can lead to SQL attacks. This can lead to data loss of information and privacy.

Least privilege:

  • Make sure the business process requires at least some money from users such as CPU usage, memory, file systems. The higher the resource consumption the higher the risk.

Fail secured:

  • However, there are many ways an app can fail with its process. The exception always comes with the handler‌ to handle failed cases.

Security been as simple as much:

  • Always create a simple way to maintain security. Come up with a simple code, it will go faster and faster.  Otherwise it will take unnecessary confusion and time.
You might be interested in
Web analytical packages can obtain the following information when someone visits a website, except Group of answer choices name
il63 [147K]

Answer:

name and address of web visitors.

Explanation:

A website refers to the collective name used to describe series of web pages linked together with the same domain name.

Web analytical packages are software features that are typically used for tracking the identity of a computer system by placing or adding cookies to the computer when it's used to visit a particular website. Thus, it's only used for tracking the identity of a computer but not the computer users.

This ultimately implies that, web analytical packages can obtain the geographic location, Internet connection type, and navigation source information when someone visits a website, but it cannot obtain the name and address of web visitors or users.

3 0
3 years ago
Which command compiles the Java source code file Welcome.java?
GarryVolchara [31]

Answer:

javac Welcome.java

Explanation:

In order to the file to compile with the default compiler in the JDK, the instruction must be of the form:

javac filename

(Note: the filename with the .java extension)

3 0
3 years ago
What is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowle
Stells [14]

Answer:

The answer is "Spyware".

Explanation:

Spyware is a supplementary program that is mounted on your customer computer and it transmits the data without authorization via the Internet. Its business includes ads, private data, and improvements in the user interface, which is why it has become recognized as the special adware class that collects and transmits user information over the web without the user's permission.

7 0
4 years ago
Helppp pleaseee help pleaseee look at picture
ale4655 [162]

Answer:

C & E

Explanation:

Brainlest, Please!

4 0
1 year ago
Read 2 more answers
What is the real meaning of hack and crack?
vovangra [49]
Hack means hack computer and crack means I guess your behind
7 0
4 years ago
Other questions:
  • When you use the bufferedreader class, you must import the ____ package into your program?
    14·1 answer
  • How has technology fragmented the audience for sports and entertainment<br> commodities?
    10·1 answer
  • A snapshot is most similar to which type of backup scheme
    8·1 answer
  • Which relation is created with the primary key associated with the relationship or associative entity, plus any non-key attribut
    6·1 answer
  • Which expression is equivalent to 3x + 3x + 3x?<br><br> From Performance Matters
    11·2 answers
  • Create a spreadsheet that lists the ten currencies you chose. For each currency, enter an amount and create a
    12·1 answer
  • Hello Answerers it would be great if you could answer this:
    12·2 answers
  • Please help thank u!!!!!
    13·2 answers
  • Bro i swear whenever i play fortnite duos, they ask you if you don't have a mic, if you don't then they just leave, so annoying
    15·2 answers
  • Using C++
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!