1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DochEvi [55]
3 years ago
5

Explain different types of networking-based attacks

Computers and Technology
1 answer:
Licemer1 [7]3 years ago
4 0

Answer:

Network-based cyber attacks. ... These may be active attacks, wherein the hacker manipulates network activity in real-time; or passive attacks, wherein the attacker sees network activity but does not attempt to modify it

You might be interested in
Briefly describe the function of storage media
SIZIF [17.4K]

Answer:

In computers, a storage medium is any technology -- including devices and materials -- used to place, keep and retrieve electronic data. It refers to a physical device or component in a computing system that receives and retains information relating to applications and users. The plural form of this term is storage media.

Early forms of storage media included computer paper tape. Holes punched in the paper corresponded to a single bit of data. A paper tape reader would interpret each punched hole and convert it to a number. Paper tape was supplanted by magnetic tape, which eventually evolved to magnetic floppy disk.

How storage media works:

Media used in computer storage receive messages in the form of data, via software commands from the computer system. The commands determine the type of storage media needed to hold the data, based on its business value, compliance implications or other factors. In tiered storage, data is moved among disk, flash and cloud storage based on automated software policies.

A storage medium may be internal to a computing device, such as a computer's hard drive, or a removable device such as an external hard drive or universal serial bus (USB) flash drive. There are various types of storage media, including magnetic tape, nonvolatile memory cards, rotating fixed disk and solid-state drives (SSDs), which are based on nonvolatile flash memory.

The term storage encompasses all data, and can be either primary or secondary storage. Primary storage refers to data that is kept in memory for fast retrieval by a computer's processor. Secondary storage is data placed on hard disk or tape to ensure backup and long-term retention.

A storage device may be a type of storage media, or a piece of storage hardware outfitted with storage media. For example, storage arrays decouple storage media from servers. Storage arrays incorporate electromechanical hard disk drives (HDDs), SSDs or a combination of each, attached to separate servers and networking.

Storage media can be arranged for access in many ways. Some well-known arrangements include:

redundant array of independent disks (RAID);

network-attached storage (NAS); and

storage area network (SAN).

SAN arrays initially were designed with HDDs, until the advent of all-flash arrays outfitted solely with SSDs. Hybrid flash arrays blend the two storage media in an integrated system, with disk providing a capacity tier alongside a faster tier of flash.

Explanation:

please mark me as brainliest

4 0
3 years ago
The formatting option functions like space bar. However instead of moving one space at a time, it allows you to move your text i
Schach [20]
What are the options???
4 0
3 years ago
Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?Ethical Decision
ratelena [41]

Answer:

Explanation:

1. Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that?

Answer:

Before the discussion, Fred, Gladys, and Charlie focused on other ends in regards to information security. Fred was more concerned with adding additional software to fix the malware issues when clearly there were easier steps that need to be taken

2. How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance?

Answer:

Gladys’s performance should be based on the new security measures and protocol that she has in place for the organization. This of course, is putting a lot of trust into Charlie’s performance as she was the one to introduce Charlie with his new plan on the organization’s new security. She practically had him nominated for CIO.

3. Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?

Answer:

Before considering outside threats, internal threats should be looked into early in the planning process. Internal threats does not necessarily mean that the employees have malicious intent, but the case of human error and failure can also be a negative contribution to cyber security. Creating a security program and education end users by creating a security policy guidance is one of the the best ways to prevent simple cyber security issues from starting

Instead of Charlie being named CISO, suppose instead that Fred hired his son-in-law, an unemployed accountant, to fill the role. Assuming the person had no prior experience or preparation for a job in information security, did Fred make an ethical choice? Explain your answer.

Answer:

Absolutely not! By hiring an unexperienced family member over a trained professional, Fred is letting his emotions get the better of him. Fred should consult with Gladys on whether his son-in-law is good candidate for the position or not. Rather than sacrifice company security, Fred could possibly find his son-in-law a position in the companies’ financial or human resources departments.

8 0
3 years ago
What does gif stand for in computer terms?
SSSSS [86.1K]
<span>GIF stands for Graphics Interchange Format</span> which was released by CompuServe in 1987. The Graphics in GIF is why some people argue against it's originally intended pronunciation as "jif" (like the peanut butter) 
4 0
3 years ago
Write a function named countWords that reads in a line of text into a string variable, counts and returns the number of words in
algol13

Answer:

function countWords(sentence) {

return sentence.match(/\S+/g).length;

}

const sentence = 'This sentence  has five  words ';

console.log(`"${sentence}" has ${countWords(sentence)} words` );

Explanation:

Regular expressions are a powerful way to tackle this. One obvious cornercase is that multiple spaces could occur. The regex doesn't care.

3 0
3 years ago
Other questions:
  • A benefit of IPsec is __________.
    8·1 answer
  • Your mothers date of birth and a unique personal identification number (pin) code provide authentication by _____.
    15·1 answer
  • This is in government
    15·1 answer
  • Computer keyboard failures can be attributed to electrical defects or mechanical defects. A repair facility currently has 25 fai
    14·1 answer
  • Can someone tell me how this is a SyntaxError! (Python3)
    12·1 answer
  • In regard to segmentation, all of the following are examples of a customer's behavior or relationship with a product EXCEPT: a)
    14·1 answer
  • How do you change the order of the slides in your presentation in the slide pane 
    15·2 answers
  • You have two microservices that need to communicate with each other without holding up a thread on either end. One service will
    6·1 answer
  • What are the different types of monitors?
    8·1 answer
  • A related database stores data in the form of______
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!