Explain why genetic diversity is a good principle for secure development. Cite an example of lack of diversity that has had a negative impact on security
What will be an ideal response?
Genetic
diversity
helps
minimize
the
impact
of
a
successful
attack
by
reducing
the
likelihood
of
the
same
attack
affecting
multiple
systems.
Students'
examples
should
be
from
attacks
with
higher
impact
because
of
the
prevalence
of
a
single
program
or
device.
You might also like to view...
Define enticement and entrapment and compare the two.
What will be an ideal response?
By choosing the Definition Only option in the Import Objects dialog box, the ____ of a table is imported, but not the ____.
A. data, structure B. data type, structure C. structure, data D. structure, data type
The Access tool that analyzes a single table in a database and splits the table into two or more tables, if necessary, when it finds redundant data is the ____________________.
Fill in the blank(s) with the appropriate word(s).
Watching someone type their password in order to learn the password is called ________.
piggybacking shoulder surfing Both piggybacking and shoulder surfing Neither piggybacking nor shoulder surfing