Answer:
NIST SP 800 30
Explanation:
Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Risk management can be defined as the process of identifying, evaluating, analyzing and controlling potential threats or risks present in a business as an obstacle to its capital, revenues and profits.
This ultimately implies that, risk management involves prioritizing course of action or potential threats in order to mitigate the risk that are likely to arise from such business decisions.
NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.
The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.
Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.
How do you reset a g.mail password?
Answer:
put: forgot password to reset it
Answer:
Change your pass word
Open your Go ogle Account. You might need to sign in.
Under "Security," select Signing in to G oo gle.
Choose Password. You might need to sign in again.
Enter your new password, then select Change Password.
What is the Full form of DC?
Answer:
Deputy Commissioner.
Answer:
the full form of DC is deputy commissioner
Select the correct answer.
Susan is a programmer and uses the hexadecimal number system to represent instructions. Which letters of the alphabet do you think Susan uses to represent the numbers 10 to 15 in this number system?
A. A to F
B. A to H
C. A to M
D. A to J
Answer is Hexadecimal : A. A to F
Create the following dataframe Student from dictionary of series and display
the details of each student. (row wise).
Name Subject Marks
1 Anjan English 78
2 Shreya Science 87
3 Meena Science 81
4 Karan Maths 91
Answer:
import pandas as pd
pd.Dataframe(information)
Explanation:
Given :
Name Subject Marks
1 Anjan English 78
2 Shreya Science 87
3 Meena Science 81
4 Karan Maths 91
information = { 'Name' : ['Anjan', 'Shreya', 'Meena', 'Karan'], 'Subject' : ['English', 'Science', 'Science', 'Maths'], 'Marks' : [ 78, 87, 81, 91]}
The information in the table can be embedded in dictionary list as given above.
Using the pandas library in python :
The Dataframe method in pandas will create the table as shown by putting the variable as an argument in the DataFrame method.
State two pieces of information that need to be labeled on the idea development sketch. 1 .________________________________________________. 2 .___________________________________________.
Answer:
Design drawings should show details on layout, measurements, plan, cross-sectional and vertical profiles. This information is prepared as scale drawings of the works to be constructed. they are legible they include all information from previous revisions and updates.
Explanation:
i have a question about Razer headsets. Is it possible to mix microphones? For example:
I have an "Electra V2" headset and microphone and I want to change it's microphone to Kraken.
Is it possible?
Answer:
In theory yes it is gonna be pretty hard but it is very possible
All of the following items may be sent via email EXCEPT *
1 point
soft copy attachments
hard copy attachments
web links
web pages
Answer:
hard copy attachments
Explanation:
Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.
One of the most widely used communication channel or medium around the world is an e-mail (electronic mail).
An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.
The following documents or files such as soft copy attachments, web links and web pages may be sent from one user to another through the use of an email.
However, hard copy attachments cannot be sent via email because they're physical documents and as such requires that they be delivered physically to the recipient.
In conclusion, you can only send soft copy documents that you cannot feel or touch with your hands over the internet and via email. Thus, an email is only designed to accept soft copy documents or files (attachments) but certainly not hard copy documents (attachments) in our technological era.
Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.
Answer:
They are inappropriate
fallouts: Access denial and data theft
Explanation:
Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.
Access denial and data theft are the fallouts associated with DOS and DDos attacks