SlideShare a Scribd company logo
1 of 2
Find an article on the internet outline a security breach or
cyberattack. Provide a link to the article and suggest a control
that would mitigate against that attack. Clearly explain why that
control would be an effective mitigation strategy.
Comment on someone else’s post. Either agree or disagree with
their suggest and
provide a reason
why you agree or disagree.
Someone's post:
Uber said two individuals who didn't work for the organization
accessed the information on an outsider cloud-based help that
Uber employments. The organization likewise said that outside
forensics specialists have not seen proof that the programmers
accessed different kinds of data. Besides the driver's permit
numbers, other individual data of every one of the 57 million
Uber riders and drivers around the globe was undermined:
names, email locations, and mobile telephone numbers.
Robbins and Schooler (2018) stated as, in the general security-
mindful integration setting, the source databases are outfitted
with their very own nearby security approaches. Each source is
self-ruling as it is planned freely from the others and nearby
applications should keep on pursuing integration. Also, none of
the sources can envision information deductions 1 that can
emerge when information is coordinated. By controlling access
to an information integration framework. In an information
integration framework, an arbiter 2 is characterized. A middle
person targets giving a one of a kind sections point to a few
heterogeneous sources. In this sort of design, security angles
and access control, specifically, speak to a significant test. Each
source planned autonomously from the rest, characterizes its
own entrance control approach.
While ridesharing applications may appear the rush of things to
come, it is yet a moderate innovation. Also, with every
innovation, it is imperative to be educated about what they
mean for your security.
By intelligently utilizing spilling huge information pipeline and
cloud advancements, SMaaS additions advantages to evade the
difficulties that begin in systematic applications. The SMS
pipeline mechanizes the collection, management, processing,
analysis, and visualization of log information. The system
extricates a data stream profile to display the execution of the
broke down application (Smith, Grande, & Merchant, 2016).
The profile catches both control and information conditions
over the appropriated errands/hubs running the broke down the
application. A few strategies are utilized for the identification
of security anomalies dependent on breaking down the data
stream profile. Our answer checks the profile against expected
highlights that oversee benevolent applications. Any deviation
from the normal highlights shows a security irregularity. The
framework causes security administrators to take moderation
activities when alarmed about found anomalies.

More Related Content

Similar to Find an article on the internet outline a security breach or cyb.docx

response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxzmark3
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxjeanettehully
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threatsAkankshaPathak27
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeSean Varga
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecJessica Lavery Pozerski
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing WebsitesIRJET Journal
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wpCMR WORLD TECH
 
Context Driven Scalable SIEM Solution
Context Driven Scalable SIEM Solution Context Driven Scalable SIEM Solution
Context Driven Scalable SIEM Solution Ertugrul Akbas
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSBRNSSPublicationHubI
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting InformationLaura Martin
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityHappiest Minds Technologies
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...IRJET Journal
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxSALU18
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemIlonaThornburg83
 

Similar to Find an article on the internet outline a security breach or cyb.docx (20)

response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracode
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSec
 
IRJET - Chrome Extension for Detecting Phishing Websites
IRJET -  	  Chrome Extension for Detecting Phishing WebsitesIRJET -  	  Chrome Extension for Detecting Phishing Websites
IRJET - Chrome Extension for Detecting Phishing Websites
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Context Driven Scalable SIEM Solution
Context Driven Scalable SIEM Solution Context Driven Scalable SIEM Solution
Context Driven Scalable SIEM Solution
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OS
 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
 
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network SecurityWhitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
Whitepaper- User Behavior-Based Anomaly Detection for Cyber Network Security
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 
Gs Ch1
Gs Ch1Gs Ch1
Gs Ch1
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docx
 
Module 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancemModule 02 Performance Risk-based Analytics With all the advancem
Module 02 Performance Risk-based Analytics With all the advancem
 

More from ernestc3

Find out how to register to vote in your community and answer the fo.docx
Find out how to register to vote in your community and answer the fo.docxFind out how to register to vote in your community and answer the fo.docx
Find out how to register to vote in your community and answer the fo.docxernestc3
 
Find any images, links, video or other information about the photogr.docx
Find any images, links, video or other information about the photogr.docxFind any images, links, video or other information about the photogr.docx
Find any images, links, video or other information about the photogr.docxernestc3
 
Find or construct a graph of the US deficit for the last 100 years. .docx
Find or construct a graph of the US deficit for the last 100 years. .docxFind or construct a graph of the US deficit for the last 100 years. .docx
Find or construct a graph of the US deficit for the last 100 years. .docxernestc3
 
Find and visit 3 websites that use a DesktopLaptop Computer.docx
Find and visit 3 websites that use a DesktopLaptop Computer.docxFind and visit 3 websites that use a DesktopLaptop Computer.docx
Find and visit 3 websites that use a DesktopLaptop Computer.docxernestc3
 
Find an example in the news of a report that touches on the global.docx
Find an example in the news of a report that touches on the global.docxFind an example in the news of a report that touches on the global.docx
Find an example in the news of a report that touches on the global.docxernestc3
 
Find a Web site that has an About Us” section or a Press Release” .docx
Find a Web site that has an About Us” section or a Press Release” .docxFind a Web site that has an About Us” section or a Press Release” .docx
Find a Web site that has an About Us” section or a Press Release” .docxernestc3
 
Find a video of a political ad for a state or national candidate i.docx
Find a video of a political ad for a state or national candidate i.docxFind a video of a political ad for a state or national candidate i.docx
Find a video of a political ad for a state or national candidate i.docxernestc3
 
Find a successful public service project that exemplifies effect.docx
Find a successful public service project that exemplifies effect.docxFind a successful public service project that exemplifies effect.docx
Find a successful public service project that exemplifies effect.docxernestc3
 
Find a successful public service project that exemplifies effective .docx
Find a successful public service project that exemplifies effective .docxFind a successful public service project that exemplifies effective .docx
Find a successful public service project that exemplifies effective .docxernestc3
 
Find a story about a life event (birth, death, marriage, etc.) from .docx
Find a story about a life event (birth, death, marriage, etc.) from .docxFind a story about a life event (birth, death, marriage, etc.) from .docx
Find a story about a life event (birth, death, marriage, etc.) from .docxernestc3
 
Find a situation (a real-world situation or a fictional situatio.docx
Find a situation (a real-world situation or a fictional situatio.docxFind a situation (a real-world situation or a fictional situatio.docx
Find a situation (a real-world situation or a fictional situatio.docxernestc3
 
First CivilizationsAfter your reading and research, you shou.docx
First CivilizationsAfter your reading and research, you shou.docxFirst CivilizationsAfter your reading and research, you shou.docx
First CivilizationsAfter your reading and research, you shou.docxernestc3
 
First assignmentPrepare a perpetual inventory record using FIFO..docx
First assignmentPrepare a perpetual inventory record using FIFO..docxFirst assignmentPrepare a perpetual inventory record using FIFO..docx
First assignmentPrepare a perpetual inventory record using FIFO..docxernestc3
 
First Assignment World Cultures Assignment 1Paper, please see the .docx
First Assignment World Cultures Assignment 1Paper, please see the .docxFirst Assignment World Cultures Assignment 1Paper, please see the .docx
First Assignment World Cultures Assignment 1Paper, please see the .docxernestc3
 
First assignment 4-1Discussion Open Forum for Criminal Investig.docx
First assignment 4-1Discussion Open Forum for Criminal Investig.docxFirst assignment 4-1Discussion Open Forum for Criminal Investig.docx
First assignment 4-1Discussion Open Forum for Criminal Investig.docxernestc3
 
First paragraph will Executive summary about our company 100 w.docx
First  paragraph will  Executive summary about our company 100 w.docxFirst  paragraph will  Executive summary about our company 100 w.docx
First paragraph will Executive summary about our company 100 w.docxernestc3
 
Firm of the Future Application Paper.Apply concepts of the f.docx
Firm of the Future Application Paper.Apply concepts of the f.docxFirm of the Future Application Paper.Apply concepts of the f.docx
Firm of the Future Application Paper.Apply concepts of the f.docxernestc3
 
Firm A and Firm B enter into a five-year currency swap. Firm A sen.docx
Firm A and Firm B enter into a five-year currency swap. Firm A sen.docxFirm A and Firm B enter into a five-year currency swap. Firm A sen.docx
Firm A and Firm B enter into a five-year currency swap. Firm A sen.docxernestc3
 
First among Equals The Effect of Team Leader Characteristics.docx
First among Equals The Effect of Team Leader Characteristics.docxFirst among Equals The Effect of Team Leader Characteristics.docx
First among Equals The Effect of Team Leader Characteristics.docxernestc3
 
First Act of HamletAfter you have read Act I and the article, lis.docx
First Act of HamletAfter you have read Act I and the article, lis.docxFirst Act of HamletAfter you have read Act I and the article, lis.docx
First Act of HamletAfter you have read Act I and the article, lis.docxernestc3
 

More from ernestc3 (20)

Find out how to register to vote in your community and answer the fo.docx
Find out how to register to vote in your community and answer the fo.docxFind out how to register to vote in your community and answer the fo.docx
Find out how to register to vote in your community and answer the fo.docx
 
Find any images, links, video or other information about the photogr.docx
Find any images, links, video or other information about the photogr.docxFind any images, links, video or other information about the photogr.docx
Find any images, links, video or other information about the photogr.docx
 
Find or construct a graph of the US deficit for the last 100 years. .docx
Find or construct a graph of the US deficit for the last 100 years. .docxFind or construct a graph of the US deficit for the last 100 years. .docx
Find or construct a graph of the US deficit for the last 100 years. .docx
 
Find and visit 3 websites that use a DesktopLaptop Computer.docx
Find and visit 3 websites that use a DesktopLaptop Computer.docxFind and visit 3 websites that use a DesktopLaptop Computer.docx
Find and visit 3 websites that use a DesktopLaptop Computer.docx
 
Find an example in the news of a report that touches on the global.docx
Find an example in the news of a report that touches on the global.docxFind an example in the news of a report that touches on the global.docx
Find an example in the news of a report that touches on the global.docx
 
Find a Web site that has an About Us” section or a Press Release” .docx
Find a Web site that has an About Us” section or a Press Release” .docxFind a Web site that has an About Us” section or a Press Release” .docx
Find a Web site that has an About Us” section or a Press Release” .docx
 
Find a video of a political ad for a state or national candidate i.docx
Find a video of a political ad for a state or national candidate i.docxFind a video of a political ad for a state or national candidate i.docx
Find a video of a political ad for a state or national candidate i.docx
 
Find a successful public service project that exemplifies effect.docx
Find a successful public service project that exemplifies effect.docxFind a successful public service project that exemplifies effect.docx
Find a successful public service project that exemplifies effect.docx
 
Find a successful public service project that exemplifies effective .docx
Find a successful public service project that exemplifies effective .docxFind a successful public service project that exemplifies effective .docx
Find a successful public service project that exemplifies effective .docx
 
Find a story about a life event (birth, death, marriage, etc.) from .docx
Find a story about a life event (birth, death, marriage, etc.) from .docxFind a story about a life event (birth, death, marriage, etc.) from .docx
Find a story about a life event (birth, death, marriage, etc.) from .docx
 
Find a situation (a real-world situation or a fictional situatio.docx
Find a situation (a real-world situation or a fictional situatio.docxFind a situation (a real-world situation or a fictional situatio.docx
Find a situation (a real-world situation or a fictional situatio.docx
 
First CivilizationsAfter your reading and research, you shou.docx
First CivilizationsAfter your reading and research, you shou.docxFirst CivilizationsAfter your reading and research, you shou.docx
First CivilizationsAfter your reading and research, you shou.docx
 
First assignmentPrepare a perpetual inventory record using FIFO..docx
First assignmentPrepare a perpetual inventory record using FIFO..docxFirst assignmentPrepare a perpetual inventory record using FIFO..docx
First assignmentPrepare a perpetual inventory record using FIFO..docx
 
First Assignment World Cultures Assignment 1Paper, please see the .docx
First Assignment World Cultures Assignment 1Paper, please see the .docxFirst Assignment World Cultures Assignment 1Paper, please see the .docx
First Assignment World Cultures Assignment 1Paper, please see the .docx
 
First assignment 4-1Discussion Open Forum for Criminal Investig.docx
First assignment 4-1Discussion Open Forum for Criminal Investig.docxFirst assignment 4-1Discussion Open Forum for Criminal Investig.docx
First assignment 4-1Discussion Open Forum for Criminal Investig.docx
 
First paragraph will Executive summary about our company 100 w.docx
First  paragraph will  Executive summary about our company 100 w.docxFirst  paragraph will  Executive summary about our company 100 w.docx
First paragraph will Executive summary about our company 100 w.docx
 
Firm of the Future Application Paper.Apply concepts of the f.docx
Firm of the Future Application Paper.Apply concepts of the f.docxFirm of the Future Application Paper.Apply concepts of the f.docx
Firm of the Future Application Paper.Apply concepts of the f.docx
 
Firm A and Firm B enter into a five-year currency swap. Firm A sen.docx
Firm A and Firm B enter into a five-year currency swap. Firm A sen.docxFirm A and Firm B enter into a five-year currency swap. Firm A sen.docx
Firm A and Firm B enter into a five-year currency swap. Firm A sen.docx
 
First among Equals The Effect of Team Leader Characteristics.docx
First among Equals The Effect of Team Leader Characteristics.docxFirst among Equals The Effect of Team Leader Characteristics.docx
First among Equals The Effect of Team Leader Characteristics.docx
 
First Act of HamletAfter you have read Act I and the article, lis.docx
First Act of HamletAfter you have read Act I and the article, lis.docxFirst Act of HamletAfter you have read Act I and the article, lis.docx
First Act of HamletAfter you have read Act I and the article, lis.docx
 

Recently uploaded

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 

Recently uploaded (20)

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

Find an article on the internet outline a security breach or cyb.docx

  • 1. Find an article on the internet outline a security breach or cyberattack. Provide a link to the article and suggest a control that would mitigate against that attack. Clearly explain why that control would be an effective mitigation strategy. Comment on someone else’s post. Either agree or disagree with their suggest and provide a reason why you agree or disagree. Someone's post: Uber said two individuals who didn't work for the organization accessed the information on an outsider cloud-based help that Uber employments. The organization likewise said that outside forensics specialists have not seen proof that the programmers accessed different kinds of data. Besides the driver's permit numbers, other individual data of every one of the 57 million Uber riders and drivers around the globe was undermined: names, email locations, and mobile telephone numbers. Robbins and Schooler (2018) stated as, in the general security- mindful integration setting, the source databases are outfitted with their very own nearby security approaches. Each source is self-ruling as it is planned freely from the others and nearby applications should keep on pursuing integration. Also, none of the sources can envision information deductions 1 that can emerge when information is coordinated. By controlling access to an information integration framework. In an information integration framework, an arbiter 2 is characterized. A middle
  • 2. person targets giving a one of a kind sections point to a few heterogeneous sources. In this sort of design, security angles and access control, specifically, speak to a significant test. Each source planned autonomously from the rest, characterizes its own entrance control approach. While ridesharing applications may appear the rush of things to come, it is yet a moderate innovation. Also, with every innovation, it is imperative to be educated about what they mean for your security. By intelligently utilizing spilling huge information pipeline and cloud advancements, SMaaS additions advantages to evade the difficulties that begin in systematic applications. The SMS pipeline mechanizes the collection, management, processing, analysis, and visualization of log information. The system extricates a data stream profile to display the execution of the broke down application (Smith, Grande, & Merchant, 2016). The profile catches both control and information conditions over the appropriated errands/hubs running the broke down the application. A few strategies are utilized for the identification of security anomalies dependent on breaking down the data stream profile. Our answer checks the profile against expected highlights that oversee benevolent applications. Any deviation from the normal highlights shows a security irregularity. The framework causes security administrators to take moderation activities when alarmed about found anomalies.