1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
belka [17]
3 years ago
8

Define three security controls designed to mitigate the risk associated with a recent leak of sensitive information that was sto

red in cleartext files.
Computers and Technology
1 answer:
emmainna [20.7K]3 years ago
5 0

Security controls are measures that are put in place to control or prevent the attack of a threat on a system. The three security controls designed to mitigate the risk associated with a recent leak of sensitive information that was stored in cleartext files are;

  • Physical Controls
  • Technical Controls
  • Administrative Controls

Physical controls refer to the measures that are put in place so that unauthorized access to sensitive files is warded off.

It could imply Installing cameras and fingerprinting to prevent such access.

Technical controls are installed to protect the hardware and software. Systems might need to be configured and programmed in such a way that can resist any attack from threats.

Antivirus and data encryption are types of technical controls.

Administrative controls are installed through the policies and standards of operations of the organization.

Through training, new employees are educated on ways to protect the systems from attack.

Learn more here:

brainly.com/question/24674099

You might be interested in
True or false with reason :- carriage inword is carriage on purchases​
Vlada [557]

Answer:

True

Explanation:

Carriage on purchases is carriage inward. Explanation: Carriage inwards refers to the transportation costs required to be paid by the purchaser when it receives merchandise it ordered with terms FOB shipping point. Carriage inwards is also known as freight-in or transportation-in.

:)

8 0
3 years ago
____________are the video images provided for editor to cut to and from instead of making viewers watch talking heads
Luda [366]

Answer:

The Scripts

Explanation:

7 0
3 years ago
What is the name of the "local user" account involved in the alleged actions (Hint: where in the file structure did you find the
Sunny_sXe [5.5K]

I will assume this is a windows computer

Answer:

  • Disk (Letter)\Users\<"Answer">\Folder\Documents\SuspiciousFile.exe
  • You can use Windows Security Logs to try and find out from what IP address the user you just found logged in from.

Explanation:

The windows user folder has folders that contain each users data, Using the file path of the suspicious file you can figure out which user is associated with the file.

Windows Security Logs collect data on logon attempts so when the user logs in their IP address should be collected in these log files.

8 0
3 years ago
Is it true or false for this question?
Lana71 [14]
Your correct I think I’m not sure
7 0
3 years ago
Check the devices that are external peripheral devices:
irina [24]

Answer:

Mouse, and keyboard

Explanation:

Common Sense

6 0
3 years ago
Other questions:
  • Terry came into work and turned on his computer. During the boot process, the computer shut down. When he tried again, the compu
    14·1 answer
  • Fred has to write a report on the general opinion of the influence of television on political decision-making. What internet res
    7·2 answers
  • Write a function called matches that takes two int arrays and their respective sizes, and returns the number of consecutive valu
    6·1 answer
  • Assume that price is an integer variable whose value is the price (in US currency) in cents of an item. Write a statement that p
    8·1 answer
  • Can you get banned on this
    10·2 answers
  • A pedometer treats walking 2,000 steps as walking 1 mile. Write a program whose input is the number of steps, and whose output i
    14·1 answer
  • Cómo surge y cuál es el objetivo del observatorio de radio y televisión
    11·1 answer
  • When you type in text in an image in a photo-editing software, where is it created?
    8·1 answer
  • If anyone want to talk come here actual question who likes anime and what kind do u watch
    7·2 answers
  • 26. Universal Containers (UC) has a queue that is used for managing tasks that need to be worked by the UC customer support team
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!