1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
6

is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r

esilience against various methods of attack. This also reduces the likelihood of a single point of failure in the security of the overall system.
Computers and Technology
1 answer:
Rina8888 [55]3 years ago
3 0

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

You might be interested in
I show you what the computer has processed and you have to look at my screen to see what I have for you. What am I?
Tamiku [17]

Hey,

The answer to this is the monitor. This is the screen or screens that hook up to your pc most of them use the modern HDMI but there are other connecters like DVI,DisplayPort  and the old VGA.

Hope this helps have a great day

-scav

6 0
3 years ago
What is a curson?
sp2606 [1]

Answer:

C. Blinking vertical line on your screen

Explanation:

A cursor is tha blinking vertical line on your screen.

5 0
4 years ago
Purple gang or green gang?
zhuklara [117]

Answer:

Purple?

Explanation:

8 0
3 years ago
Read 2 more answers
Jason wants to play a DVD. His Mac doesn't have a DVD drive, but his friend's Mac has one. Which Mac feature can Jason use to ac
Delicious77 [7]

Answer:

he could use his mac book and let his friend use his mac book

Explanation:

3 0
3 years ago
A profit of ₹ 1581 is to be divided amongst three partner P,Q and R in ratio 1/3:1/2:1/5.theshareof R will be?​
Burka [1]

Answer:

R's share = 306

Explanation:

Sum of ratio = 1/3 + 1/2 + 1/5

LCM = 30

Sum of ratio = (10 + 15 + 6) / 30 = 31 /30

Profit to be shared = 1581

P = 1/3 ; Q = 1/2 ; R = 1/5

Share of R :

(Total profit / sum of ratio) * R ratio

[1581 / (31/30)] * 1/5

(1581 / 1 * 30/31) * 1/5

51 * 30 * 1/5

51 * 6 = 306

5 0
3 years ago
Other questions:
  • Define a method printAll() for class PetData that prints output as follows with inputs "Fluffy", 5, and 4444. Hint: Make use of
    10·1 answer
  • Question 7 of 10
    13·1 answer
  • 1. Before operating any power tool, you need to
    14·1 answer
  • I have answered 22 questions and my messages are still not working what is it that i'm doing wrong?
    6·1 answer
  • Does anyone know about ICT? i need help ASAP
    9·1 answer
  • Http://www.alegrium.com/sgi/2/eibder
    5·1 answer
  • 1. Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative va
    11·1 answer
  • How do you move a slide to another location in you your<br> presentation?
    7·1 answer
  • Which validation check can be used on the following data. "XX000" 
    9·1 answer
  • How to generate random numbers in excel without duplicates
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!