Briefly describe the triad that makes up computer security.

What will be an ideal response?


ANSWER: Investigators often work as a team to make computers and networks secure in an organization. The computer investigations function is one of three in a triad that makes up computing security. In an enterprise network environment, the triad consists of the following parts:
* Vulnerability assessment and risk management
* Network intrusion detection and incident response
* Computer investigations

Computer Science & Information Technology

You might also like to view...

What is the output of the following function call, given the function definition below?

cout << tester (4); // function call int tester (int n) // function definition { if (n == 1) return 3; else return 2 * tester ( n – 1); } a) 3 b) 6 c) 12 d) 24

Computer Science & Information Technology

Here are four letters: A B C D

While keeping all four letters on the same line, use proximity to group B and C and make each of A and D into a group of one.

Computer Science & Information Technology

The ________ in OS X can help you change a default program

Fill in the blank(s) with correct word

Computer Science & Information Technology

The SELECT statement

SELECT A
FROM T
WHERE P
accesses a table, T, with attributes A, B, C and K, where K is the primary key, and P is a predicate. The values of all attributes are randomly chosen over the integer domain. Since the table is updated frequently, there is a limitation of at most one clustered and one unclustered index. In each of the following parts choose the indexes (type, search key, clustered or unclustered) to optimize the SELECT statement and maintain the primary key constraint when the value of P is as specied. In each case give the query plan you expect the DBMS to choose for the SELECT and the reason you think that plan is best. Do not use index covering. (a) P is (B = 10) (b) P is (B > 10) (c) P is (B > 10 AND C = 5) (d) P is (B > 10) and the WHERE clause is followed by the clause ORDER BY A

Computer Science & Information Technology