COMPUTER THREATS SECURITY
WHAT IS COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Compliance based security
|
|
Risk-based security
|
|
Adhoc approach
|
|
Risk-Free approach
|
Detailed explanation-1: -Two popular approaches to implementing information security are the bottom-up and top-down approaches.
Detailed explanation-2: -The security of ad hoc networks can be based on protection in the link or network layer. In some ad-hoc solutions, the link layer offers strong security services for protecting con-fidentiality and authenticity, in which case all of the security requirements need not be addressed in the network or upper layers.
Detailed explanation-3: -Security as Code, Shift Left Security, and Security Automation are three of the most popular methodologies and frameworks for building a more secure organization.
Detailed explanation-4: -There are three components of network security: hardware, software, and cloud services.