answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
2 years ago
9

Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention

and resistance, and (3) detection and response.
Computers and Technology
1 answer:
snow_lady [41]2 years ago
4 0

Answer:

Explanation:

1. Authentication is a method for confirming users' identities. Once a system determines the authentication of a user, it can then determine the access privileges for that user. Authorization involves providing a user with permission, including access levels and abilities. For example file access, hours of access, and amount of allocated storage space.

2. Content filtering is a software organizations use that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information. Encryption scrambles information into an alternative form that requires a key or password to decrypt. In a security branch, an intruder is then unable to read encrypted information. A firewall is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings.

3. Intrusion detection software (IDS) features full-time monitoring tools that search for patterns in network traffic to identify intruders.

You might be interested in
While creating an animation, Gina has prepared a document stating the purpose and type of audience for the animation. What has
nekit [7.7K]

Answer:

Flash document

Explanation:

While creating an animation, we need to find out the purpose and the type of the audience, the file size and various other features of the animation. And all these details are being mentioned in one document, and we know that as the flash document. The purpose and the target audience both are being mentioned in the flash document. And this flash document is being used as a reference while developing an animation. The purpose and target audience are important factors while designing an animation.

4 0
2 years ago
We Deliver trains its truck loaders how to set the packages in the delivery vehicles, so that when delivery drivers are pulling
damaskus [11]

Answer:

We Deliver trains its truck loaders how to set the packages in the delivery vehicles, so that when delivery drivers are pulling packages off their trucks, they are organized in a specific order and with the label facing forward to reduce errors and save time. A <u>Procedure </u>is being implemented when directing that the trucks be loaded in this specific manner.

Explanation:

Procedure is the method or set of instructions to perform some operation in specific order to complete the task in an organized manner. It is the type of directions to perform some operations.

In above mentioned case, if we want that the packages should set in some organized manner such as labeling face of package in forward direction so that, chance of error should reduce and time save. We should provide some procedure to the truck loaders.

5 0
2 years ago
Explain why Windows and Linux implements multiple locking mechanisms. Describe the circumstances under which they use spinlocks,
galben [10]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

Depending on the needs of the device programmers these OS have various locking frameworks. Spinlocks become beneficial for preemptive multitasking processes during which a thread will operate in such an active loop instead of risking a rest queue latency. Mutexes become beneficial to utility lockers.

  • Solaris 2 employs flexible mutexes, indicating something like this on preemptive multitasking computers, the mutex is introduced with either a spinning switch.
  • Semaphores and state variations are much more effective methods for consistency where a commodity needs to be managed for such a prolonged period of time because spinning is unstable over a prolonged time.

8 0
1 year ago
Write code that uses the input string stream inss to read input data from string userinput, and updates variables usermonth, use
mr Goodwill [35]

Answer:

It will be a java code.

Explanation:

import java.util.Scanner;

public class StringInputStream {

    public static void main (String [] args) {

        Scanner inSS = null;

        String userInput = "Jan 12 1992";

        inSS = new Scanner(userInput);`

        String userMonth = "";

        int userDate = 0;

        int userYear = 0;

        /* Your solution goes here  */

        System.out.println("Month: " + userMonth);

        System.out.println("Date: " + userDate);

        System.out.println("Year: " + userYear);

        return;

   }

}

3 0
2 years ago
Read 2 more answers
C# Write, compile, and test a program named PersonalInfo that displays a person’s name, birthdate, work phone number, and cell p
Soloha48 [4]

Answer:

#include <stdio.h>

#Include<iostream>

using namespace std;

//Define required function

PersonalInfo( )   {

    printf("Name   : Robert Josh\n");  

    printf("DOB    : July 14, 1975\n");  

    printf("Work Phone : 00-00000000\n");  

    printf("Cell Phone : 11-777777777\n");  

    return(0);  

 }

int main()   {

    //Call function

 PersonalInfo( );

 return 0;

 }

Explanation:

Its just a simple code to print required details when the function PersonalInfo is called.

5 0
2 years ago
Other questions:
  • When driving, your attention is __________.
    5·2 answers
  • Leena needs to manually update the TOC and would prefer not to change the styles in the document.
    9·2 answers
  • Templates contain common layout and formatting that can save you time by not having to recreate documents from scratch. True or
    10·1 answer
  • Light travels at 3 × 108 meters per second. A light-year is the distance a light beam travels in one year.Write a PYTHON program
    14·1 answer
  • Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to
    11·1 answer
  • The following checksum formula is widely used by banks and credit card companies to validate legal account numbers: d0 + f(d1) +
    13·1 answer
  • Samuel received an email that looked like it came from his bank. The email told him to click a link that opened an official look
    7·1 answer
  • Write an expression to print each price in stock prices.
    15·1 answer
  • Which best compares and contrasts visual and performing arts? Both careers use communication skills; however, people involved in
    15·2 answers
  • A credit card company receives numerous phone calls throughout the day from customers reporting fraud and billing disputes. Most
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!