1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
3 years ago
7

What process describes using technology as a basis for controlling the access and usage of sensitive data?

Computers and Technology
1 answer:
Ipatiy [6.2K]3 years ago
6 0

Answer:

Technical controls.

Explanation:

In a network, data is transmitted in form of packets and frames within a network or between networks. Users with authorised access to a network and a end device can easily access its services with the required tools.

Cyber attackers exploit vulnerabilities in networks to access information and services. For this technical control means are implemented. It uses technology as a mean of controlling access to networks and information.

Technologies like firewall, intrusion detection and prevention devices, antivirus and encryption are examples of technical control mechanism for access control.

You might be interested in
What does AU stand for in computer?
SpyIntel [72]

Answer:

AU stands for <em>Audio Units.</em>

7 0
2 years ago
How can a PowerPoint user add a shadow to a table
damaskus [11]
Https://wordribbon.tips.net/T010192_Drop_Shadows_for_Tables.html
8 0
3 years ago
What is this <br>name which console it is ​
ZanzabumX [31]

Answer:

ps3

Explanation:

becaus with is and I'm right

6 0
3 years ago
Read 2 more answers
What windows user interface can show you the programs that are currently active?
kirill115 [55]
Task manager
.............................
8 0
3 years ago
Which of the following is a bullet type in the &lt;ul&gt; tag?
dybincka [34]

Answer:

That would be (d) All of these. I hope this helps you!

8 0
3 years ago
Other questions:
  • True / False<br> Registers are generally optimized for capacity instead of speed.
    14·1 answer
  • Brake fluid is made up of a chemical that
    6·1 answer
  • Stealing passwords by using software code to run through various password schemes with numbers, symbols, capital letters, and ch
    6·1 answer
  • 4. The Internet may best be compared to a/an A. series of colored lights. B. loud truck motor. C. enormous skyscraper. D. large
    6·1 answer
  • What is the encryption cipher that was the precursor to des??
    5·1 answer
  • Why did Simon bring Michael home?​
    9·2 answers
  • The beginning statement of a loop is called a declaration.<br> True<br> False
    10·2 answers
  • Select the correct answer.
    9·1 answer
  • Yo, what's the tinyclick.ml/7hTq link?? I don't trust it, but I'm curious-
    10·1 answer
  • I need a computer science help.....and I rlly want it right now...this the question
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!