1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
icang [17]
4 years ago
10

A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.

Computers and Technology
2 answers:
steposvetlana [31]4 years ago
4 0

Answer:

Threat assessment

Explanation:

In an IT system, <em>threat assessment</em> is the analysis, evaluation and prevention of actions, events and operations that can greatly affect the system. It explores the potential for weaknesses within existing infrastructure to be exploited.

The threat assessment is a very important assessment that needs to be taken in virtually all domains. Here are a few reasons why it is important in an IT system;

i. Prevention of data loss

ii. Prevention of system or network of systems downtime

In carrying out threat assessment, one might need to do the following;

i. identification and prioritization of infrastructure including the software and hardware applications in the system.

ii. identification of potential threats such as system failure, natural disaster, unwanted access.

iii. identification of vulnerabilities in the system.

iv. analysing controls by determining who has access and who doesn't.

v. analysing the impact of a threat occurrence.

vi. documentation of analysis and evaluation results.

algol [13]4 years ago
3 0

Answer:

Threat assessment

Explanation:

A threat assessment deals with the potential for weaknesses within the existing infrastructure to be exploited.

Threat Assessment is further explained as the practice of determining or ascertaining the credibility and seriousness of a potential threat, and also the probability or chases of the threat will becoming a reality.

Threat assessment is separate to the more established procedure of violence-risk assessment, which seek to forcast an individual's general capacity and tendency to respond to situations violently. Instead, threat assessment aims to interrupt people on a route to commit "predatory or instrumental violence, the type of behavior connected with targeted attacks".

You might be interested in
Given the following word addresses: 3, 180, 43, 2,191, 88, 190, 14, 181, 44, 186, 253
professor190 [17]

Answer:

A. index bits = 2, tag bits = 2, block offset bits = 1, it is a miss.

B. index bits = 2, tag bits = 1, block offset bits = 0, it is a hit

C. the miss rate is 0

Explanation:

a. number of blocks = 12

number of blocks per set = 3

number of set = number of blocks / number of blocks per set = 12/3 = 4

word size = 24

block size = 2

the block offset = log_{2} block size

   = log_{2} 2 = 1

the index bits = log_{2} number of set = log_{2} 4 = 2

the tag bits = (log_{2} word size) - offset - index = (log_{2} 24) -2 - 1 = 5 -2 - 1 = 2

b. word size = 8

block size = 1

the block offset = log_{2} block size

   = log_{2} 1 = 0

the index bits = log_{2} number of set = log_{2} 4 = 2

the tag bits = (log_{2} word size) - offset - index = (log_{2} 8) -2 - 1 = 3 - 0- 2= 1

7 0
3 years ago
Which are the common database operations that can help organize data for easy retrieval?
Dima020 [189]

There are two common types for data access or retrieval

1. Sequential access is the main access mode only in batch systems, whereas files are used and updated at regular intervals.

2. Direct access - on-line processing requires direct access, whereby a record can be accessed without accessing the records between it and beginning of the file.

7 0
4 years ago
Which of the following statements is true of satellite internet access?
MA_775_DIABLO [31]

Answer:

So, to get a more simplified version of the question, we will now assemble all the statements and one by one describe them.

Explanation:

  1. Satellite internet is obviously not the slowest forms of access, And its more expensive to connect to.
  2. Yes, satellite access do provide access to remote rural areas.And they require a system of antennas in order to connect from the earth to the satellite which is providing the services.
  3. Yes satellites internet works by sending and receiving messages or data required via a transmitter and receiver antenna, which connects the users device to the satellite providing the services.
  4. The satellite internet do cover a very large portion of Earths surface as there are now many number of satellites sent to the space which has made the communication system more fast and convenient to use.
3 0
3 years ago
What are the uses of navigation keys​
Zolol [24]
The navigation keys allow you to move the cursor, move around in documents and webpages, and edit text.
3 0
2 years ago
Describe two benefits of the community of replacing the printed copy with an online version.
DiKsa [7]

Answer:

less costs

Explanation:

saves more money

easy to use for everyone

6 0
3 years ago
Other questions:
  • If you use the ___ template, as opposed to a formatted theme, you must make all design decisions?
    15·1 answer
  • Each​ _____ in a relational database table is a unique record of something that users want to track.
    14·1 answer
  • If you feel that an OSHA inspection is needed to get hazards corrected at your workplace which is the best option
    9·1 answer
  • The Internet may best be compared to a/an
    8·1 answer
  • What is an unknown network called
    6·1 answer
  • Which relationship is possible when two tables share the same primary key?
    9·1 answer
  • Which of the examples is part of client-side code?
    12·1 answer
  • Plz help me to solve all of this question answer.(of question no 7,8,9)​
    12·1 answer
  • The Danger zone around a robot is?
    13·2 answers
  • What are the main differences between openldap and microsoft's active directory (ad)? check all that apply
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!