1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Degger [83]
3 years ago
13

In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a

reas. What is not one of the areas?
Computers and Technology
1 answer:
Ugo [173]3 years ago
4 0

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

You might be interested in
Discuss TWO changes in ICMP that took place with the development of IPV6 and indicate why those changes were made.
max2010maxim [7]

Answer:

Over and above basic medication signaling, but instead of signaling, ICMPv6 could be used for other objectives. It could be utilized for the below description.

Explanation:

That falls into the same category even though IPv4 does through ARP.  

  • <u>Neighbor Discovery</u>:

Used mostly for control of hosts but instead multichannel interface setup.  

  • <u>Router Discovery</u>:

Trying to manage Handheld IPv6 hand-offs.  

Throughout IPv6, within a week of negligible and sometimes more broadcast group, this same ICMPv6 response can begin. The whole last extension connector before another ICMPv6 connector contains a 58-value new Header field.

3 0
3 years ago
A(n) ____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariabl
Black_prince [1.1K]

Answer:

A(n)  <u>Cipher</u> or crypto-system is an encryption method or process encompassing the algorithm, key(s) or crypto-variable(s), and procedures used to perform encryption and decryption.

Explanation:

  • Cryptography is such a technique that is used for the secure transfer of the information. We make codes for this purpose.
  • Cryptosystem is such a system in cryptography is simply an encryption method that has three algorithms. One algorithm is used for the generation of key, one for encryption and decryption.
  • Encryption is a process of converting the information in a data that is not understandable and decryption, this non-understandable data is converted into information so that we can read it.  
3 0
4 years ago
The main differences between laptops and desktop computers other than size and portability.
e-lub [12.9K]

Answer:

Difference between laptops and desktop computer are:

  • Desktop computers contain wide variety of components, but laptops are realtively expensive than desktop computers because laptop has high speed and better graphics designs which increased the cost of whole system.
  • Desktop computer processors are larger in size and it is more efficient and powerful as compared to laptops because laptop processor still has some limitations.
  • Laptop uses less power as compared to desktop computer because laptop contain small components and that is why it needs less power.
  • Desktop computers are easy to upgrade and in laptops hard drive and memory, these two components needs to be upgraded.

5 0
3 years ago
Alexa it is olewi.............................................
Sladkaya [172]

Answer:

jvksvksdvkbvkjsdkcn

Explanation:

6 0
3 years ago
Read 2 more answers
Why is printer an output device​
Vitek1552 [10]

printer is an output device because,

A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper.

So, a printer is an external hardware output device that takes the electronic data stored on a computer or other device and generates a hard copy of it.

therefore, it can be said that a printer is an output device

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which of these automotive repair areas helps the vehicle change speeds to operate efficiently under all conditions?
    5·1 answer
  • When using a wireless mouse, what is the most common port used for the transmitter? 
    7·1 answer
  • Consider the following method:
    8·2 answers
  • The computer mouse is used to
    7·1 answer
  • ____ is typically used with lans that have a star topology and can be used in conjunction with twisted-pair, coaxial, or fiber-o
    12·1 answer
  • The lightbulb transfers electricity energy into light what is one type of energy that is also generated that is not a desired af
    14·1 answer
  • Which type of security software prevents, detects, and removes the malware program that tries to collect personal information or
    8·2 answers
  • Why is it important to have at least one backup stored off-site?
    8·1 answer
  • In batch operating system three job J1 J2 and J3 are submitted for execution each job involes an I/O activity a CPU time and ano
    13·1 answer
  • Can someone make me a natural selection comic but only 5 same thing in the example pic but draw the animal different and a diffe
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!