1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
3 years ago
7

What process describes using technology as a basis for controlling the access and usage of sensitive data?

Computers and Technology
1 answer:
Ipatiy [6.2K]3 years ago
6 0

Answer:

Technical controls.

Explanation:

In a network, data is transmitted in form of packets and frames within a network or between networks. Users with authorised access to a network and a end device can easily access its services with the required tools.

Cyber attackers exploit vulnerabilities in networks to access information and services. For this technical control means are implemented. It uses technology as a mean of controlling access to networks and information.

Technologies like firewall, intrusion detection and prevention devices, antivirus and encryption are examples of technical control mechanism for access control.

You might be interested in
When was the GoPro camera invented?​
masya89 [10]

Answer:

2002

Explanation:

Please mark me brainliest :)

6 0
3 years ago
Why is the transmission of information impartial on websites?
Scrat [10]
It should be, but sometimes it isn't. It depends on the website type you visit.
7 0
3 years ago
With internet access you can send e mail to any computer in the world true or false
Salsk061 [2.6K]

Answer:

true

Explanation:

I think this answers is right

5 0
3 years ago
Read 2 more answers
Which web design concept is most closely related to elements that symbolize the real world? A. node B. landmark c.metaphor IN D.
sergij07 [2.7K]

Answer:

landmark

Explanation:

6 0
3 years ago
Define a model or version that is used to test an idea is called a _______.
gulaghasi [49]
The answer is prototype
5 0
3 years ago
Other questions:
  • A function operates on this, which may consist of a constant, a cell reference, or another function.
    7·1 answer
  • If you see an advertisement for a 3TB portable drive, this is most likely a reference to the device having a capacity of three
    10·1 answer
  • My mom works from home selling her craft work online to people all over the world. She can do this from home because we have acc
    13·2 answers
  • A communication medium which allows receivers to observe multiple cues, such as body language and tone of voice, and allows send
    15·1 answer
  • 1.<br> The correct way to use a seat belt is
    8·1 answer
  • Experienced students may serve as mentors if they are at least age 21 and have at least 3 years of post-secondary education. In
    5·1 answer
  • What does coding mean​
    10·2 answers
  • Determine the factors using computer failures and defects​
    8·1 answer
  • What types of information should have their sources cited to avoid plagiarism? List at least 3
    10·1 answer
  • Who's hype for Halo Infinite?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!