Explain why genetic diversity is a good principle for secure development. Cite an example of lack of diversity that has had a negative impact on security

What will be an ideal response?


Genetic
diversity
helps
minimize
the
impact
of
a
successful
attack
by
reducing
the
likelihood
of
the
same
attack
affecting
multiple
systems.
Students'
examples
should
be
from
attacks
with
higher
impact
because
of
the
prevalence
of
a
single
program
or
device.

Computer Science & Information Technology

You might also like to view...

Define enticement and entrapment and compare the two.

What will be an ideal response?

Computer Science & Information Technology

By choosing the Definition Only option in the Import Objects dialog box, the ____ of a table is imported, but not the ____.

A. data, structure B. data type, structure C. structure, data D. structure, data type

Computer Science & Information Technology

The Access tool that analyzes a single table in a database and splits the table into two or more tables, if necessary, when it finds redundant data is the ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Watching someone type their password in order to learn the password is called ________.

piggybacking shoulder surfing Both piggybacking and shoulder surfing Neither piggybacking nor shoulder surfing

Computer Science & Information Technology