Answer:
A,C,D
Explanation:
as a way to play games
as a way to copy the work of others
The CIA triad, which stands for Confidentiality, Integrity, and Availability, is a framework for ensuring information security. Each aspect of the triad is associated with different methods and techniques to ensure its protection.
The correct matching for the first part of the question is:
1. Confidentiality - Biometric Verification, Two-Factor Identification, File permissions
2. Integrity - One way encryption checksums (hashes), promptly applying system upgrades and patches
3. Availability - preparing for fast disaster recovery with backups and business continuity plans
The correct matching for the second part of the question is:
1. Authentication and Authorization - used to determine identities and permissions
2. Prevention and Resistance - stop intruders from accessing and reading data
3. Detection and Response - detection of intruders by monitoring network traffic/intruders
The correct matching for the third part of the question is:
1. Asymetric key encryption - Encryption that uses a pair of keys, one called a public key and the other a private key.
2. Symetric key encryption - Using the same key to encrypt and decrypt a message.
3. One-way encryption - A hash function that generates a digital fingerprint of a message is an example of this; Allows people to exchange secret messages without ever having met to exchange a key
Learn more about The CIA triad:
#SPJ11
Answer:
SECURITY ANALYSTS
Explanation:
Security Analysts is a specialised security
administrator which is responsible for maintaining the security and integrity of data and performing system development life cycle activities in the development of a security system. The security analyst must have knowledge of every aspect of information security within the organisation and must analyze the security measures of the company and determine how effective they are.
The specialized security Administrator will be responsible for keeping data safe across the organization by monitoring, reporting, and addressing them and he must takes measures to protect a company's sensitive information.
TCP/IP is the standard set of protocols. Note that these are actually 2 protocols working together.
TCP (Transmission Control Protocol) is responsible for ensuring the reliable transmission of data across Internet-connected networks, while IP (Internet Protocol) defines how to address and route each data packet to make sure it reaches the right destination.
Let me know if you have any questions.
Assistive technology can promote healthy emotional and social development by catering the needs of young children and teens in a faster and easier way when used correctly. When they reach into adulthood, it will be easier for them to access things because they are used to it.