Intro to comp sci question the table below lists a series


Intro to COMP SCI question

The table below lists a series of specific mitigation strategies. For each of the threat scenarios described below, list all of the mitigation strategies below that can significantly improve security

antivirus software

file backup

one-way encryption

callback firewall

two-way encryption

digital signature

log files

spam filter

1. You work for the United States government and your machine stores highly-classifiedinformation. You do not use this computer for e-mail, but it is connected to the Internet. Not only are you expected to maintain the confidentiality of the classified information, it is also expected that anyone attempting an attack on this machine must be caught and prosecuted.

2. You are writing a computer program to store personal identification numbers (PINs) for acompany that manufactures automated teller machines (ATMs).

3. You work for a financial company, and your boss frequently e-mails you instructions tomake large, expensive stock purchases and sales. If you get the instructions wrong, youcould lose your job (and cost the company a lot of money).

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: Intro to comp sci question the table below lists a series
Reference No:- TGS01184148

Expected delivery within 24 Hours