1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
2 years ago
6

is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r

esilience against various methods of attack. This also reduces the likelihood of a single point of failure in the security of the overall system.
Computers and Technology
1 answer:
Rina8888 [55]2 years ago
3 0

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

You might be interested in
By converting a given collection of tables to an equivalent third normal form collection of tables, you remove any problems aris
dolphi86 [110]

Answer:

The answer is "functional".

Explanation:

It's a relation of two attributes, usually between the primary key and other main attributes of a table. It turns the collection of tables into a third standard table array.

  • It allows you to controls the quality of data into the database.  
  • It is the disparity between the positive and weak architecture of the database plays a crucial role.

4 0
3 years ago
What is a possible explanation for the issue described below? A user reports that ever since she or he began creating animations
Marat540 [252]
VRAM because VRAM is used for graphic intensive workloads
8 0
3 years ago
Read 2 more answers
PLEASE HURRY!!<br> Look at the image below
levacccp [35]
Answer is power and base

Explanation: both power and base are number variables
8 0
3 years ago
Select the correct answer. What property do you use to retrieve the selected option from a list box? A. selectedIndex B. selecte
sertanlavr [38]
The answer is A.selectedIndex
4 0
3 years ago
Read 2 more answers
Select the correct answer. Richard owns a chain of hardware stores. He wants to update the store website and write a numbered li
olga_2 [115]
What’s the answer choices ?
3 0
3 years ago
Other questions:
  • This operating system was used by individual computers and required users to type commands.
    9·1 answer
  • Which part of a window lets you see a fileâs contents without opening the file?
    9·1 answer
  • which of the following is involved in ordering an outline. A.grouping B.merging C.organizing D.arranging
    10·1 answer
  • Each object that is created from a class is called a(n) ____________ of the class.
    5·2 answers
  • Consider a single CPU system with an active process A. Explain what happens in the following circumstances including any interru
    13·1 answer
  • This device is used to connect sections of large networks?
    12·2 answers
  • which statement draws an accurate comparison between social media marketing and conventional marketing?
    13·1 answer
  • Thomas has signed a deal with a production house that allows them to use his images on their website. What is required when imag
    5·2 answers
  • Which of the following Web sites would be MOST credible?
    6·1 answer
  • How to do 2. Pleaser
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!