1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
6

is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r

esilience against various methods of attack. This also reduces the likelihood of a single point of failure in the security of the overall system.
Computers and Technology
1 answer:
Rina8888 [55]3 years ago
3 0

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

You might be interested in
Mariel types a sentence. She then decides to include that sentence four more times. She then decides she only wants the sentence
Minchanka [31]
CTRL Z and CTRL Y
(undo)_____(redo)
8 0
3 years ago
Read 2 more answers
Disadvantage do you think one can have if he or she does use electronic media
Dima020 [189]
- discontinuity
- dependence on the electric power
and more
6 0
3 years ago
To define constructors and member functions outside of a class's original scope, the operator can be used.
Artyom0805 [142]

Answer: Scope resolution operator(::)

Explanation: A member function and the constructor can be called within the function easily but for the execution of the these components outside the class , a special operator is required to call the functions. The scope resolution operator(::) preceding with the name of class is thus used for defining of the function outside class.This operator maintains the cope of the function and constructor outside the class.

8 0
3 years ago
To locate all the documents in a Mongo database that match an expression, use the _____________ method.
Lena [83]

Answer:

find()

Explanation:

When dealing with MongoDB the method that needs to be used in this scenario would be the find() method. This method basically returns all of the records that exist in the collection on which it is called, if no parameter is passed. If you pass a parameter/expression then only the records that match completely the expression will be returned to the user, otherwise nothing is returned. For example, on a database (db) we would call the following

db.find() ... This will return all records

db.find({specific}) ... This will return only the records that match specific.

4 0
3 years ago
Design a database suitable for a university registrar. This database should include information about students, departments, pro
zalisa [80]

Answer:

For designing a database suitable for a University registrar, the following information is included which are Information about Students, Information about Departments, Information about Professors, Information about courses, Student Grades,TA's for a course, Department offering different courses.

In creating the database registrar system the following values are defined such as Entity, Attributes of entities,The relationship among entities.

Explanation:

Solution

The following requirements are for designing of database for  a University registrar.

The Database Schema includes the following:

  • Information about Students
  • Information about Departments.
  • Information about Professors.
  • Information about courses.
  • Student Grades.
  • TA's for a course.
  • Department offering different courses.

Now,

For the design of Database for Registrar System we need to define the following:

(1)Entity: Student, Course, Instructor, Course offering.

(2) Attributes of Entities:

  • Student entity has Sid, name, program as its attributes
  • Course has Course_n, title, credits, and syllabus as its attributes
  • Instructor has iid ,name ,dept, title as its attributes
  • Course offering has section_no ,time, room, year,semester as its attributes

(3) Relationship among various entities:

  • Enrolls
  • Teaches
  • © is offered

Note: kindly find an attached copy of the E-R Diagram for University Registrar below, and his diagram shows student entity enrolls various courses which can be having teaches relationship with instructor. Course is being offered by relationship is offered by course offering.

5 0
3 years ago
Other questions:
  • Write the interface (.h file) of a class GasTank containing: A data member named amount of type double. A data member named capa
    13·1 answer
  • All spreadsheet formula should start with
    12·1 answer
  • A word that has a specific, predefined meaning in a programming language is called
    8·1 answer
  • What are the advantages of using the internet as theinfrastructure for electronic commerce and electronicbusiness?
    6·1 answer
  • Using ________ as a promotion method will bring return visitors to your site.
    8·1 answer
  • What is word length in computer​
    10·2 answers
  • on the road you are traveling,the pavement markings change from broken white lines to solid white lines between the lanes of tra
    5·1 answer
  • The price of an item you want to buy is given in dollars and cents. You pay for it in cash by giving the clerk d dollars and c c
    6·1 answer
  • Which of these are the two main components of a CPU?
    5·2 answers
  • How to get flash to work on chrome?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!