Suppose you are the security manager of a company and one of your goals is to design security mechanisms based on three security goals (1) prevent the attack (2) detect the attack or (3) recover from the attack. Depending on the situation or application, you have to adopt one of these security goals. For each of the following statements, give an example of an application or situation in which the statement is true. (i). Prevention is more important than detection and recovery
(ii). Detection is more important than prevention and recovery
(iii). Recovery is more important than prevention and detection

Answers

Answer 1
Answer:

Answer:

(i) Prevention is more important than detection and recovery.

(ii) Detection is more important than prevention and recovery.

(iii) Recovery is more important than prevention and detection.

Explanation:

(i) Prevention is more important than detection and recovery.

Prevention of attack can be through various applications for example a walk through gates are placed in order to prevent any attacker from entering the premises and causing harm.

(ii) Detection is more important than prevention and recovery.

Detection of an attack can be done through for example a security alarm can detect an attack and inform others.

(iii) Recovery is more important than prevention and detection.

Recovery of an attack can be done by for example an insurance which will recover a portion of loss occurred during the attack.

Answer 2
Answer:

Answer: A prevention

Explanation:

You can alway's prepare for someone by preventing from doing something but you can't detection something right away it is not h3cked and you can't recover something that is not detected


Related Questions

Create a query that will list all technician names, employee numbers, and year hired in order by year hired (Newest to Oldest).
PLEASE ANYONE!!which present margins would be best to get the most information to fit on the page​
Answer this question without running pin again. Assume that the 100,000 element integer array that you allocated starts at address 0x50000000 in memory, the size of an integer is 4 bytes and the D-cache is initially empty. As you read the integers in the array one-by-one, starting at index 0, how many D-cache misses will you see for reading the first 40 integers when the cache block size is:
Choose the missing term-------time time.sleep(3)
What is the center of mass of the assembly? a) X=‐11.05 Y=24.08 Z=‐40.19 b) X=‐11.05 Y=‐24.08 Z=40.19 c) X= 40.24 Y=24.33 Z=20.75 d) X= 20.75 Y=24.33 Z=40.24

Consider the following definition of a recursive method. public static int mystery(int[] list, int first, int last) { if (first == last) return list[first]; else return list[first] + mystery(list, first + 1, last); } Given the declaration int[] alpha = {1, 4, 5, 8, 9}; What is the output of the following statement? System.out.println(mystery(alpha, 0, 4)); a. 1 b. 18 c. 27 d. 32

Answers

Answer:

c. 27

Explanation:

  • In recursion method, a method calls itself until a condition becomes true and returned back. In mystery(), at first time, first is 0 and last is 4. Condition is checked and 0!=4 so else part is executed in which again mystery is called with first as 1 and last 4. This will go again and again until first=4.
  • When first=4 it is also equal to last so if part is executed and alpha[4] is returned which is 9, now it comes alpha[3] +9 which is 8+9 =17 .
  • It is returning values to its previous calls that is why it will reduce to alpha[0]+alpha[1]+alpha[2]+17 which is nothing but sum of all elements of a alpha
  • Then, 1+4+5+8+9=27.

Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.

Answers

The best method in network security to prevent intrusion are:

  • Understand and use OSI Model.  
  • Know the types of Network Devices.  
  • Know Network Defenses.  
  • Separate your Network.

How can I improve security through network design?

In the above case, the things to do is that one needs to focus on these areas for a a good network design. They are:

  • Physical security.
  • Use of good firewalls.
  • Use the DMZ, etc.

Therefore, The best method in network security to prevent intrusion are:

  • Understand and use OSI Model.  
  • Know the types of Network Devices.  
  • Know Network Defenses.  
  • Separate your Network.

Learn more about network security from

brainly.com/question/17090284

#SPJ6

Answer:

There are many benefits to be gained from network segmentation, of which security is one of the most important. Having a totally flat and open network is a major risk. Network segmentation improves security by limiting access to resources to specific groups of individuals within the organization and makes unauthorized access more difficult. In the event of a system compromise, an attacker or unauthorized individual would only have access to resources on the same subnet. If access to certain databases in the data center must be given to a third party, by segmenting the network you can easily limit the resources that can be accessed, it also provides greater security against internal threats.

Explanation:

Why would a German gif have less bytes than a French gif

Answers

The French lost and the Germans have won and Germans are more superior to the French.

Checkpoint 10.43 Write an interface named Nameable that specifies the following methods: _______{ public void setName(String n) public String getName()} Fill in the blank.

Answers

Answer:

Fill the blank with

public interface Nameable {

Explanation:

Required

Complete code segment with the interface definition

The given code segment is divided into three parts

1. The interface

2. The method that returns nothing

3. The method that returns string

The blank will be filled with the definition of the interface.

The definition is as follows:

public interface Nameable {

Analyzing the above definition

public -----> This represents the modifier

interface ------> This represents that the definition is an interface

Nameable ------> This represents the name of the interface

A retail company assigns a $5000 store bonus if monthly sales are $100,000 or more. Additionally, if their sales exceed 125% or more of their monthly goal of $90,000, then all employees will receive a message stating that they will get a day off. When your pseudocode is complete, test the following monthly sales and ensure that the output matches the following. If your output is different, then review your decision statements.Monthly Sales Expected Output
monthlySales 102500 You earneda $5000 bonus!
monthlySales = 90000
monthlySales 112500 You earned a $5000 bonus!
All employees get one day off!

Answers

Answer:

To answer this question, i prepared a pseudocode and a program written in python;

Pseudocode begins here:

1. Start

2. Input montlySales

3. If monthlySales < 100000

3.1. Display Nothing

4. Else

4.1 Display “You earned a $5000 bonus!”

4.2 If monthlySales > 1.25 * 90000

4.2.1 Display “All employees get one day off!”

5.     Stop

Python Program starts here (See attachment for proper view of the program):

#Prompt user for input

monthlySales = float(input("Monthly Sales: "))

#Check monthlySales

if monthlySales < 100000:

     print("")

else:

     print("You earned a $5,000 bonus")

     if monthlySales > 1.25 * 90000:

           print("All Employees get the day off")

Explanation:

To answer this question, a conditional if statement is needed.

The pseudocode (and the program) starts by prompting user for input;

Then, the user input is first compared with 100,000

If it's less than 100,000; then nothing is displayes

However, if it is at least 100,000

"You earned a $5,000 bonus" is displayed

It further checks if the user input is greater than 125% of 90,000

If yes, "All Employees get the day off" is displayed else, nothing is displayed.

The pseudocode (and the program) stops execution, afterwards

What are the things that a computer literate understands?Name thems.​

Answers

Answer:

•Determine your IP address.

•Verify physical connectivity to the network.

•Check that you have a logical connection to the network.

•Find out what path network traffic takes to get to its destination.

Translate from DNS names to IP addresses.

Other Questions