1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
schepotkina [342]
3 years ago
5

What do you think about the difference and similarities between the process of information security system implementation verse

an information system implementation?
Computers and Technology
1 answer:
allochka39001 [22]3 years ago
6 0

Answer:

My take on the difference and similarities between the process of information security system implementation and an information system implementation is:

A strong information security program is a fundamental part of maintaining a business in the computerized age when the quantity of information breaks and security occurrences are expanding dramatically. Without a security program, you leave your organization, clients, and information in danger. We should investigate the segments of a data security program, and stroll through a bit by bit direct on how you can execute one at your association.

Explanation:

The fundamental objective inside an association while executing an information system is to expand productivity in association action by methods for IT.

For instance: programmed data handling, satisfactory data and report the executives

You might be interested in
if you dont' have access to nessus, which of the following can be used by an attacker to gain information about remote *nix host
galina1969 [7]

The NMap procedure that can be used to help you to gain information about remote *nix hosts is Script Scanning

<h3>What is script scanning?</h3>

The script scanner is known to be tool that acts as a measure component to the real Windows scripting host component as it helps to intercepts scripts, and also scans them before they are said to be executed.

Therefore, The script scanner is known to be tool that acts as a measure component to the real Windows scripting host component as it helps to intercepts scripts, and also scans them before they are said to be executed.

Learn more about Script Scanning from

brainly.com/question/18152781

#SPJ11

4 0
2 years ago
Pat creates a table in a spread sheet
Anna11 [10]

Answer:

Explanation:

Details?

7 0
4 years ago
Good HTML skills will be required in order to prevent what from happening in the design of a web page?
Verizon [17]

Answer:

to properly use the tags in the web page

Explanation:

The full form HTML is Hyper Text Mark up Language. HTML is used in designing a good web page in the computer. It is used to design the document that are displayed in the web browser.

Instead of using a programming language to do the functions of a web page, the markup language uses the tags to identify the different types of the contents and purposes that they serve in the web page. A good HTML skills are required to prevent the web page from any improper designing of the contents in the web page.

5 0
3 years ago
Developers found a "time of check to time of use" (TOCTTOU) vulnerability in their application. The vulnerability made it possib
earnstyle [38]

This vulnerability above is taking advantage of the race condition process in the application.

<h3>What is race condition? </h3>

This race condition is said to be in the critical section or one that is a part of the program and it is a place where shared memory is accessed and it is concurrently worked on or executed by two or more threads.

Hence,  This vulnerability above is taking advantage of the race condition process in the application.

Learn more about race condition from

brainly.com/question/13445523

#SPJ2

5 0
2 years ago
Input and output devices provide means of communication between computers and outer world<br>​
abruzzese [7]

Answer:

See explanation

Explanation:

This question seem incomplete as what's required was not stated.

To answer this question, I'll assume it's a fill-in-the-gap question

The definition given above describes computer peripherals.

Peripherals is one of the links between a computer user and the computer itself.

Through peripherals such as keyboards, mouse, light pen , one can send input into the computer.

In the same vein, one can get outputs through peripherals such as the computer monitor, speakers, printers, etc.

3 0
3 years ago
Other questions:
  • Which of the following is a primary source?
    6·2 answers
  • Individuals and businesses have concerns about data security while using Internet-based applications. Which security risk refers
    13·1 answer
  • Unlike the String class where you must pass a message to an object (instance) of the class, as in x.length( ), in order to use t
    5·1 answer
  • What is the difference between the audio mixer and meters panel.
    8·1 answer
  • In checking the digital signature, the verifier ____. a. decrypts the digital signature it received with the supplicant public k
    13·1 answer
  • Which of the selections below is not a benefit of imaging the computers on your network? There are fewer licensing fees because
    11·1 answer
  • Destinguish between qualitative data and quantitave
    12·1 answer
  • My computer just fried anybody know why it did that?
    14·2 answers
  • D) Software which is basically language translation software.​
    11·1 answer
  • What facilitates the automation and management of business processes and controls the movement of work through the business proc
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!