1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
6

is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r

esilience against various methods of attack. This also reduces the likelihood of a single point of failure in the security of the overall system.
Computers and Technology
1 answer:
Rina8888 [55]3 years ago
3 0

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

You might be interested in
Liz's meeting is scheduled to end at 9:30. It is 9:20 and team
Nadya [2.5K]

Answer:

dismiss all of them

Explanation:

4 0
3 years ago
What is a commonly publicized password sql injection string?
aleksley [76]
The strings "or 1=1" and ""or ''=''"  can be commonly used to trick an SQL WHERE clause into becoming true.

So if you specify <span>' or ''=' as a password, you can log in if the query string would be:

</span><span>select username,pass from users where username='you' and password='' or ''='<span>' limit 0,1;</span></span>
7 0
4 years ago
The Class of computers used in <br>scientific applications are called​
sashaice [31]

Answer:

sala de informática

Explanation:

salas de informática são utilizadas cada vez mais no mundo pelo aumento excedente de uso da tecnologia os estudantes precisam aprender conceitos básicos de informática e eletrônica

5 0
3 years ago
Which of the following is most often true?
Ksenya-84 [330]

Answer:

a) The IOS is stored in flash and copied into RAM at startup.

Explanation:

Well,  in most router architectures, the IOS is copied into and run from RAM. This is because of the flash allows the IOS to be upgraded in any moment or allows it  to stores multiple IOS files.

Keep in mind that if the flash memory is empty, the router will try to use a TFTP server to load an IOS image from the network and for the last resort if the TFTP server is unavailable, the router will load the limited version Cisco IOS software image stored in ROM.

5 0
3 years ago
How can i get a java complier for linux and ubuntu?
egoroff_w [7]
You can install Eclipse. If you want you can look into the Ubuntu store and see if they have any.
5 0
3 years ago
Other questions:
  • using unsafe sites may be a. harmful to your computer c. okay as long as you don���t leave any personal information b. okay as l
    9·2 answers
  • 2. You have classes to represent different shapes (see below). You realize you can benefit from inheritance and polymorphism by
    13·1 answer
  • In a bubble sort, you use a(n) ____ loop to make pair comparisons.
    5·1 answer
  • Although Neptune is the farthest planet from the Sun, it travels in a fixed orbit around the Sun and never changes its path. Wha
    8·2 answers
  • 5: what privacy issues have arisen with webcams in mobile devices?
    14·1 answer
  • What file name would allow you to easily find and edit your document later in Word Online?
    14·2 answers
  • It is the "executable" phrase of Word<br>Wide Web with dynamic applications,?<br>​
    9·1 answer
  • 20.
    8·1 answer
  • Only people who have nitrotype answer this question!!!
    6·2 answers
  • Why is the engineering design process important to the customer?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!