1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
10

In computer science what are the methods used to protect the information stored by a piece of software called?

Computers and Technology
1 answer:
Nezavi [6.7K]3 years ago
3 0

Answer:

cryptography

Explanation:

cryptography

In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher

You might be interested in
Explain what a honeypot is. In your explanation, give at least one advantage and one disadvantage of deploying a honeypot on a c
tatuchka [14]

Answer:

A honeypot is a computer network set up to act as a decoy to track, deflect, or research trying to obtain unwanted access to the information system.

Explanation:

A honeypot is a device or device network designed to imitate possible cyber-attack targets. It can be utilized to detect or deflect assaults from a legitimate military target. It may also be used to collect knowledge on how cybercrime works.

<u>Advantage:- </u>

  • Data Value:- One of the challenges faced by the research community is to obtain meaning from big data. Companies hold large quantities of data daily including firewall logs, device logs, and warnings for vulnerability scanning.
  • Resources:- The problem facing most protection systems is resource shortages or even the depletion of resources. Power saturation is when a protection asset can no longer work since it is overloaded by its assets.
  • Simplicity :- I find simplicity to be the biggest single strength of honeypots. No flashy techniques are to be created, no stamp computer systems to be managed, no rule units to be misconfigured.

<u>Disadvantage:-  </u>

That honeypot doesn't replace any safety mechanisms; they just operate with your overall security infrastructure and improve it.

4 0
4 years ago
Which of the following terms best describes the security domain that relates to how data is classified and valued?
d1i1m1o1n [39]

Answer:

c) Access Control.

Explanation:

The term which describes the security domain best that relates to  how the data is valued and classified is Access Control.

Access Control :It is the restriction of access of a resource or a place that is selective.Permission to access a resource is called authorization.It is an important term in the field of information security and physical security.

7 0
3 years ago
Internet privacy refers to the level of information sharing on the web collected through web cookies, caches, and browsing histo
Zanzabum

The level of information sharing on the web that are mainly collected through web cookies, caches, and browsing history of a web browser is referred to as Internet privacy: True.

A web browser can be defined as a software program that is typically designed and developed for viewing a HTML document or browsing the Internet.

An Internet privacy refers to the level of privacy protection an end user has while browsing the Internet, especially with reference to the vast range of protocols, technologies, and frameworks (concepts) that are deployed.

This ultimately implies that, Internet privacy relates to the level of information sharing on the web that are mainly collected on a web browser through the following means:

  • Web cookies
  • Caches
  • Browsing history

Read more: brainly.com/question/3840341

6 0
2 years ago
How do scientists plan on unlocking the secrets to Mars?
zmey [24]
Sending rovers and other explorers I think
3 0
3 years ago
Read 2 more answers
The purpose of project management is _____. executing a requirement improvement working toward a common goal completing a projec
Anna11 [10]

Answer:

working toward a common goal.

Explanation:

Project management can be defined as the process of designing, planning, developing, leading and execution of a project plan or activities using a set of skills, tools, knowledge, techniques and experience to achieve the set goals and objectives of creating a unique product or service.

Generally, projects are considered to be temporary because they usually have a start-time and an end-time to complete, execute or implement a project plan.

Furthermore, the main purpose of project management is working toward a common goal.

This ultimately implies that, project managers should ensure adequate attention and time is taken to identify, analyze and manage capital, raw materials, people, system of tasks and other resources, so as to effectively and efficiently achieve a common goal with all project stakeholders.

The fundamentals of Project Management which are universal across all fields and businesses includes;

1. Project initiation.

2. Project planning.

3. Project execution.

4. Monitoring and controlling of the project.

5. Adapting and closure of project.

In conclusion, it is very important and essential that project managers in various organizations, businesses and professions adopt the aforementioned fundamentals in order to successfully achieve their aim, objectives and goals set for a project.

3 0
3 years ago
Other questions:
  • Modern operating systems decouple a process address space from the machine’s physical memory. List two advantages of this design
    15·1 answer
  • When a program lets the user know that an invalid choice has been made, this is known as:?
    6·1 answer
  • A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company n
    9·2 answers
  • The method header of the equals() method within the string class is ____.
    13·1 answer
  • What are use class diagram, use case description and activity diagrams for use cases?
    7·1 answer
  • A client has an issue with large files taking a long time to open or save. As time goes by, the issue worsens. The client has hu
    8·1 answer
  • 7) through: (0, 4) and (-1,0)​
    10·1 answer
  • The commands available from a menu change depending upon what you are doing.<br> True<br> False
    11·2 answers
  • Determine whether the phrase below is a sentence or a fragment.
    12·1 answer
  • _____________ do not contribute to effective group work.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!