1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex73 [517]
3 years ago
10

Given the following scenario, discuss in depth the risk assessment strategies and components that you would deploy in order to e

nsure that secure defenses and compliance attributes are embedded into the core of your network and information security deployment. Marketing company X has a need to keep their proprietary methods of marketing strategies safe from other companies who may use their information to gain a competitive advantage. The company is choosing cloud storage as their safe haven for information, and has decided not to store any of their data locally. For speed purposes, the company has also chosen to not use two-factor authentication and has chosen basic password security authentication instead, allowing those with a need to know to access the information using a simple password. This was mandated by the CFO of the company in order to make things easy for the staff, who know very little about computer security, and complain about things taking too many steps to access. Discuss and describe how you would handle this situation, and perhaps make note of any recommended changes you would make as you deploy your risk assessment strategy to help the CTO understand the consequences and/or rewards for the decisions made thus far.
Computers and Technology
1 answer:
Bingel [31]3 years ago
5 0

Answer:

I can't make out the question

You might be interested in
How do you become a hacker? Is there any good websites? Where do you begin? Preferably a white hat.
4vir4ik [10]
I suggest learning and studying technology and the way a computer or a phone works and how it receives info. That way, you will be able to give the device something it won't handle...... I think....
3 0
3 years ago
I'm doing a python assignment for my coding class, and the input part just isn't working, someone please help out and tell me wh
tigry1 [53]

,.....,.........mm malds quería saber

8 0
2 years ago
Which statement is true about customizing presentation programs?
pashok25 [27]
A presentation program<span> is a </span>software<span> package used to display information in the form of a </span>slide show. It has three major functions: an editor that allows text to be inserted and formatted, a method for inserting and manipulating graphic images, and a slide-show system to display the
6 0
4 years ago
What is the correct terminology for a group of infected computers controlled by a person to commit cyber-crime?
Pavel [41]
I believe it’s called a virus or a hacker
5 0
3 years ago
make 2 dimensional arryas, ask for the rows and columns, then enter the values and then multiply both arrays.
Gemiola [76]

Answer:

The program of this question can be given as:

Program:

#include <iostream>      //header file.

using namespace std;

int main()         //define main method.

{

   int First_matrix[10][10], Second_matrix[10][10], multiplication[10][10], rows, columns, i, j, k;  //define variable.

   cout<<"Enter the rows of matrix:";        

   cin>>rows;              //insert rows.

   cout<<"Enter the columns of matrix:";  

   cin>>columns;                        //insert columns

   cout<<"Enter elements of first matrix:"<< endl;     //inserting elements of second matrix

   for(i = 0; i < rows; i++)

   {

       for(j = 0; j < columns; j++)

       {

           cin >> First_matrix[i][j];

       }

   }

   cout<< "Enter elements of second matrix:"<< endl;          //inserting elements of second matrix

   for(i = 0; i < rows; i++)

   {

       for(j = 0; j < columns; j++)

       {

           cin >> Second_matrix[i][j];

       }

   }

   // multiplication of matrix.

   for(i = 0; i < rows; i++)

   {

       for(j = 0; j < columns; j++)

       {

           multiplication[i][j]=0;

           for(k = 0; k < columns; k++)

           {

               multiplication[i][j] =multiplication[i][j] +First_matrix[i][k] * Second_matrix[k][j];

           }

       }

   }

   // Displaying matrix.

   cout<< "First Matrix: " << endl;

   for(i = 0; i < rows; i++)

   {

   for(j = 0; j < columns; j++)

   {

       cout<<" "<<First_matrix[i][j];

   }

   cout<<endl;

   }

   cout<< "Second Matrix: "<<endl;

   for(i = 0; i < rows; i++)

   {

   for(j = 0; j < columns; j++)

   {

       cout<<" "<<Second_matrix[i][j];

   }

   cout<<endl;

   }

   //Displaying multiplication of matrix.

   cout << endl << "multiplication of Matrix: " << endl;

   for(i = 0; i < rows; i++)

   {

   for(j = 0; j < columns; j++)

   {

       cout<<" "<<multiplication[i][j];

   }

   cout<<endl;

   }

   return 0;

}

Output:

Enter the rows of matrix: 2

Enter the columns of matrix:2  

Enter elements of first matrix: 1

2

4

3

Enter elements of  second matrix:5

4

3

1

First Matrix:

1  2

4  3

Second Matrix:

5  4

3  1

multiplication of Matrix:

11  6

29  19

Explanation:

In the above matrix (2-dimensional array) program firstly we insert the rows and columns for creating a user-defined matrix. Then we insert the first matrix by using a loop. In this loop, we used row and column that is inserted by the user. Similarly, we insert the second matrix. then we multiply the matrix. In the multiplication, we define 3 loop that is (i,j,k). first loop(i) work on the rows and the second and third loop(j,k) work on the columns. In the last first we print matrix (first, second). Then we print there multiplication.

6 0
3 years ago
Other questions:
  • The kitchen in any café is a noisy place. To make sure the orders which you have carefully written down on your notepad make it
    14·1 answer
  • Once you've connected to a data source, which button would you select to add a first name to your form letter?
    6·2 answers
  • What device operates at the network layer (layer 3) of the osi model and forwards packets across computer networks?
    7·1 answer
  • What type of code do computers typically use to operate? A. CSS B. HTML 5 C. HTML D. Binary
    14·1 answer
  • Someone plzzzzz help me!!!
    6·1 answer
  • If the individual accessing the system for disaster recovery purposes were not familiar with the IT system and required system a
    5·1 answer
  • A python package used in text analysis and natural language processing. True or False
    10·1 answer
  • You cannot then move and resize the control on the form as desired with your mouse TRUE OR FALSE​
    6·2 answers
  • Which of the following should be clicked to open Backstage View?
    7·2 answers
  • What is the purpose of protocols in data communications?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!