1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
6

is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r

esilience against various methods of attack. This also reduces the likelihood of a single point of failure in the security of the overall system.
Computers and Technology
1 answer:
Rina8888 [55]3 years ago
3 0

Answer:

Defense in Depth (DiD).

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Defense in Depth (DiD) can be defined as a concept or framework in cyber security that typically involves the process of layering multiple defensive mechanisms and security control throughout an information technology (IT) system, so as to prevent data theft or an unauthorized access to user data.

Basically, this cyber security technique is designed such that when a layer of the defensive mechanism fails, another security layer step in to mitigate and prevent the attack. Thus, it causes redundancy when an attacker exploits a vulnerability in a system, a breach of security or when one of the security layers fail.

You might be interested in
Why is Abraham called the Father of Believers?
mixer [17]
Because of his strong faith,demonstrated again and again in difficult acts of obedience,

3 0
3 years ago
This is in government
Anon25 [30]
I would have thought that it was C.

5 0
3 years ago
What are the two types of computer keyboards and how are they different?
VARVARA [1.3K]
A piano keyboard
A qwerty keyboard
A Dvorak Simplified Keyboard

These are 3 types of keyboard
4 0
3 years ago
Read 2 more answers
Each contestant auditioned her singing voice for the pageant. Participle: Word it Modifies:​
irakobra [83]

Answer:

participle is singing

word it modifies is voice

4 0
3 years ago
As a computer science student, which career you will select and what do you predict about the future of that specific IT-Career.
miv72 [106K]

Answer:

A cyber security agent

Explanation:

That will mean protecting organizations from being hacked by other ethical hackers

4 0
3 years ago
Other questions:
  • What are some consequences of internet addiction​
    9·1 answer
  • What is the most likely cause of a print job rendering the wrong colors on the output?
    14·1 answer
  • Write a program that will input the names, ages and weights of three siblings and display the lightest followed by the youngest
    13·1 answer
  • Hannah decides to burn her video portfolio to a DVD. She wants to hand it over to a movie producer she will meet at a social eve
    15·1 answer
  • 3. Write a program to find the area of a triangle using functions. a. Write a function getData() for user to input the length an
    10·1 answer
  • A period in which unemployment is low, business produces many goods and services, and wages are good is called ______.
    8·1 answer
  • The {blank} view is the working window of a presentation.
    15·2 answers
  • Ajdbksjdnksnsd helppp​
    11·1 answer
  • Select each of the steps involved in creating a table in a presentation.
    12·1 answer
  • Resource _____ let you view, manage, and automate tasks on multiple aws resources at a time.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!