answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
2 years ago
9

Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention

and resistance, and (3) detection and response.
Computers and Technology
1 answer:
snow_lady [41]2 years ago
4 0

Answer:

Explanation:

1. Authentication is a method for confirming users' identities. Once a system determines the authentication of a user, it can then determine the access privileges for that user. Authorization involves providing a user with permission, including access levels and abilities. For example file access, hours of access, and amount of allocated storage space.

2. Content filtering is a software organizations use that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information. Encryption scrambles information into an alternative form that requires a key or password to decrypt. In a security branch, an intruder is then unable to read encrypted information. A firewall is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings.

3. Intrusion detection software (IDS) features full-time monitoring tools that search for patterns in network traffic to identify intruders.

You might be interested in
Temperature Class Write a Temperature class that will hold a temperature in Fahrenheit and provide methods to get the temperatur
posledela

Answer:

Explanation:

   public class Temperature

   {

       double ftemp;

       public int Constructor(double fahrenheit)

       {

           ftemp = fahrenheit;

          return Convert.ToInt32(ftemp);

       }

       public void setFahrenheit(double fahrenheit)

       {

           ftemp = fahrenheit;

       }

       public void getFahrenheit()

       {

           ftemp = Constructor(ftemp);

       }

       public void getCelcius()

       {

           ftemp = (ftemp - 32) * 5 / 9;

       }

       public void getKelvin()

       {

           ftemp = (ftemp - 32) * 5 / 9 + 273.15;

       }

   }

8 0
2 years ago
Write a program that allows you to create a file of customers for a company. The first part of the program should create an empt
ira [324]

Answer:

Explanation:good

7 0
2 years ago
Edit cell B15 to include a formula without a function that divides the total regional sales in Quarter 1 (cell B14) by the numbe
DerKrebs [107]

Answer:

=B14/G2

Explanation:

In cell B15 we would type = to set the value of the cell to the sum of the equation.

Then we have to type in the equation. In this question it is cell B14 divided by cell G2 written like: B14/G2

Then we combine both the = and the equation =B14/G2

8 0
2 years ago
Kristine has been getting many unsolicited emails from a particular address. She thinks that these emails may harm her computer.
vovikov84 [41]
Kristine should mark the messages as spam.
3 0
2 years ago
Read 2 more answers
____________________ parameters are useful in three situations: • When the value of the actual parameter needs to be changed • W
jenyasd209 [6]

Answer:

The correct word for the blank space is: Reference.

Explanation:

In C++, Reference Parameter is a type of parameter that does not need additional storage since it represents an already existing function.  The function has the characteristic of passing more than one (1) variable. Reference parameters are also used to edit the existing parameter or when referencing a function saves storage compared to creating a new function.

8 0
2 years ago
Other questions:
  • Which type of broadband internet access involves using cellular data networks? ​?
    13·1 answer
  • Ismael would like to insert a question mark symbol in his document. What steps will he need to follow to do that?
    5·2 answers
  • ACCOUNTING
    13·2 answers
  • A school librarian has been asked to identify inappropriate Internet usage. Which students would most likely be reported to the
    5·2 answers
  • Write a program that asks the user to input an integer that is a perfect square. A perfect square is an integer that is equal to
    14·1 answer
  • Templates contain common layout and formatting that can save you time by not having to recreate documents from scratch. True or
    10·1 answer
  • Disk scheduling algorithms in operating systems consider only seek distances, because Select one: a. modern disks do not disclos
    13·1 answer
  • Referential integrity constraints are concerned with checking INSERT and UPDATE operations that affect the parent child relation
    5·1 answer
  • Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which princ
    8·1 answer
  • HackerCards is a trendy new card game. Each type of HackerCard has a distinct ID number greater than or equal to 1, and the cost
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!