SlideShare a Scribd company logo
1 of 1
What are the essential outcomes of secure system retirement? Justify your position.
(Cybersecurity)
Solution
Computer security , also known as cybersecurity or IT security , is the protection of
information systems from theft or damage to thehardware, the software, and to the information
on them, as well as from disruption ormisdirection of the services they provide.
It includes controlling physical access to the hardware, as well as protecting against harm that
may come via network access, data and code injection, and due to malpractice by operators,
whether intentional,accidental, or due to thembeing tricked into deviating from secure
procedures.
The field is of growing importance due to the increasing reliance on computer systems in most
societies [4]
and the growth of"smart" devices, includingsmartphones, televisions and tiny
devices as part of theInternet of Things – and of the Internet and wireless network such as
Bluetoothand Wi-Fi.
Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data
accessibility and machine learning to detect advanced persistent threats.

More Related Content

Similar to What are the essential outcomes of secure system retirement- Justify y.docx

What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory CR Group
 
Elements of cybersecurity
Elements of cybersecurityElements of cybersecurity
Elements of cybersecuritySonaliG6
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
What is Cyber security.pdf
What is Cyber security.pdfWhat is Cyber security.pdf
What is Cyber security.pdfchanduvarma019
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdfBelayet Hossain
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 

Similar to What are the essential outcomes of secure system retirement- Justify y.docx (20)

Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory What Is Cyber Security? | Cyberroot Risk Advisory
What Is Cyber Security? | Cyberroot Risk Advisory
 
Elements of cybersecurity
Elements of cybersecurityElements of cybersecurity
Elements of cybersecurity
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
cyber security
cyber security cyber security
cyber security
 
What is Cyber security.pdf
What is Cyber security.pdfWhat is Cyber security.pdf
What is Cyber security.pdf
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Computer security and
Computer security andComputer security and
Computer security and
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Byod
ByodByod
Byod
 

More from loisj1

What are the three reasons that the environment matters- Which of thos.docx
What are the three reasons that the environment matters- Which of thos.docxWhat are the three reasons that the environment matters- Which of thos.docx
What are the three reasons that the environment matters- Which of thos.docxloisj1
 
What are the software security activities in the life cycle-SolutionTh.docx
What are the software security activities in the life cycle-SolutionTh.docxWhat are the software security activities in the life cycle-SolutionTh.docx
What are the software security activities in the life cycle-SolutionTh.docxloisj1
 
What are the ps command line options to view information about threads.docx
What are the ps command line options to view information about threads.docxWhat are the ps command line options to view information about threads.docx
What are the ps command line options to view information about threads.docxloisj1
 
What are the steps a company cant take to protext itself against the s.docx
What are the steps a company cant take to protext itself against the s.docxWhat are the steps a company cant take to protext itself against the s.docx
What are the steps a company cant take to protext itself against the s.docxloisj1
 
What are the risks common to financial institutions- liquidity- exchan.docx
What are the risks common to financial institutions- liquidity- exchan.docxWhat are the risks common to financial institutions- liquidity- exchan.docx
What are the risks common to financial institutions- liquidity- exchan.docxloisj1
 
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docx
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docxwhat are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docx
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docxloisj1
 
What are the primary keys of the following table- Explain why the foll.docx
What are the primary keys of the following table- Explain why the foll.docxWhat are the primary keys of the following table- Explain why the foll.docx
What are the primary keys of the following table- Explain why the foll.docxloisj1
 
What are the major differences between capitalism- communism- and soci.docx
What are the major differences between capitalism- communism- and soci.docxWhat are the major differences between capitalism- communism- and soci.docx
What are the major differences between capitalism- communism- and soci.docxloisj1
 
What are the issues involved in measurement in organizational developm.docx
What are the issues involved in measurement in organizational developm.docxWhat are the issues involved in measurement in organizational developm.docx
What are the issues involved in measurement in organizational developm.docxloisj1
 
What are the key differences between Windows- Apple- and Linux-Solutio.docx
What are the key differences between Windows- Apple- and Linux-Solutio.docxWhat are the key differences between Windows- Apple- and Linux-Solutio.docx
What are the key differences between Windows- Apple- and Linux-Solutio.docxloisj1
 
What are the implications of unstructured data to database design- Sup.docx
What are the implications of unstructured data to database design- Sup.docxWhat are the implications of unstructured data to database design- Sup.docx
What are the implications of unstructured data to database design- Sup.docxloisj1
 
What are the income levels and infrastructure development of Mobius SL.docx
What are the income levels and infrastructure development of Mobius SL.docxWhat are the income levels and infrastructure development of Mobius SL.docx
What are the income levels and infrastructure development of Mobius SL.docxloisj1
 
What are the four stages of John Dewey SolutionFor Dewey- learning wa.docx
What are the four stages of John Dewey  SolutionFor Dewey- learning wa.docxWhat are the four stages of John Dewey  SolutionFor Dewey- learning wa.docx
What are the four stages of John Dewey SolutionFor Dewey- learning wa.docxloisj1
 
What are the equilibrium concentrations- And how do you solve it- What.docx
What are the equilibrium concentrations- And how do you solve it- What.docxWhat are the equilibrium concentrations- And how do you solve it- What.docx
What are the equilibrium concentrations- And how do you solve it- What.docxloisj1
 
What are the Disadvantages of IFRS (International Financial Reporting.docx
What are the Disadvantages of IFRS (International Financial Reporting.docxWhat are the Disadvantages of IFRS (International Financial Reporting.docx
What are the Disadvantages of IFRS (International Financial Reporting.docxloisj1
 
What are the differences between a linked list and a stack-SolutionA S.docx
What are the differences between a linked list and a stack-SolutionA S.docxWhat are the differences between a linked list and a stack-SolutionA S.docx
What are the differences between a linked list and a stack-SolutionA S.docxloisj1
 
what are the con-'s of virtual reality in specificSolutionDisadvantage.docx
what are the con-'s of virtual reality in specificSolutionDisadvantage.docxwhat are the con-'s of virtual reality in specificSolutionDisadvantage.docx
what are the con-'s of virtual reality in specificSolutionDisadvantage.docxloisj1
 
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docxWhat are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docxloisj1
 
What are some tax consequences related to a qualified pension plan- (P.docx
What are some tax consequences related to a qualified pension plan- (P.docxWhat are some tax consequences related to a qualified pension plan- (P.docx
What are some tax consequences related to a qualified pension plan- (P.docxloisj1
 
What are some primary reasons why an embedded system developer would u.docx
What are some primary reasons why an embedded system developer would u.docxWhat are some primary reasons why an embedded system developer would u.docx
What are some primary reasons why an embedded system developer would u.docxloisj1
 

More from loisj1 (20)

What are the three reasons that the environment matters- Which of thos.docx
What are the three reasons that the environment matters- Which of thos.docxWhat are the three reasons that the environment matters- Which of thos.docx
What are the three reasons that the environment matters- Which of thos.docx
 
What are the software security activities in the life cycle-SolutionTh.docx
What are the software security activities in the life cycle-SolutionTh.docxWhat are the software security activities in the life cycle-SolutionTh.docx
What are the software security activities in the life cycle-SolutionTh.docx
 
What are the ps command line options to view information about threads.docx
What are the ps command line options to view information about threads.docxWhat are the ps command line options to view information about threads.docx
What are the ps command line options to view information about threads.docx
 
What are the steps a company cant take to protext itself against the s.docx
What are the steps a company cant take to protext itself against the s.docxWhat are the steps a company cant take to protext itself against the s.docx
What are the steps a company cant take to protext itself against the s.docx
 
What are the risks common to financial institutions- liquidity- exchan.docx
What are the risks common to financial institutions- liquidity- exchan.docxWhat are the risks common to financial institutions- liquidity- exchan.docx
What are the risks common to financial institutions- liquidity- exchan.docx
 
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docx
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docxwhat are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docx
what are the Pro-'s and Con-'s of virtual reality -SolutionPro-'s of v.docx
 
What are the primary keys of the following table- Explain why the foll.docx
What are the primary keys of the following table- Explain why the foll.docxWhat are the primary keys of the following table- Explain why the foll.docx
What are the primary keys of the following table- Explain why the foll.docx
 
What are the major differences between capitalism- communism- and soci.docx
What are the major differences between capitalism- communism- and soci.docxWhat are the major differences between capitalism- communism- and soci.docx
What are the major differences between capitalism- communism- and soci.docx
 
What are the issues involved in measurement in organizational developm.docx
What are the issues involved in measurement in organizational developm.docxWhat are the issues involved in measurement in organizational developm.docx
What are the issues involved in measurement in organizational developm.docx
 
What are the key differences between Windows- Apple- and Linux-Solutio.docx
What are the key differences between Windows- Apple- and Linux-Solutio.docxWhat are the key differences between Windows- Apple- and Linux-Solutio.docx
What are the key differences between Windows- Apple- and Linux-Solutio.docx
 
What are the implications of unstructured data to database design- Sup.docx
What are the implications of unstructured data to database design- Sup.docxWhat are the implications of unstructured data to database design- Sup.docx
What are the implications of unstructured data to database design- Sup.docx
 
What are the income levels and infrastructure development of Mobius SL.docx
What are the income levels and infrastructure development of Mobius SL.docxWhat are the income levels and infrastructure development of Mobius SL.docx
What are the income levels and infrastructure development of Mobius SL.docx
 
What are the four stages of John Dewey SolutionFor Dewey- learning wa.docx
What are the four stages of John Dewey  SolutionFor Dewey- learning wa.docxWhat are the four stages of John Dewey  SolutionFor Dewey- learning wa.docx
What are the four stages of John Dewey SolutionFor Dewey- learning wa.docx
 
What are the equilibrium concentrations- And how do you solve it- What.docx
What are the equilibrium concentrations- And how do you solve it- What.docxWhat are the equilibrium concentrations- And how do you solve it- What.docx
What are the equilibrium concentrations- And how do you solve it- What.docx
 
What are the Disadvantages of IFRS (International Financial Reporting.docx
What are the Disadvantages of IFRS (International Financial Reporting.docxWhat are the Disadvantages of IFRS (International Financial Reporting.docx
What are the Disadvantages of IFRS (International Financial Reporting.docx
 
What are the differences between a linked list and a stack-SolutionA S.docx
What are the differences between a linked list and a stack-SolutionA S.docxWhat are the differences between a linked list and a stack-SolutionA S.docx
What are the differences between a linked list and a stack-SolutionA S.docx
 
what are the con-'s of virtual reality in specificSolutionDisadvantage.docx
what are the con-'s of virtual reality in specificSolutionDisadvantage.docxwhat are the con-'s of virtual reality in specificSolutionDisadvantage.docx
what are the con-'s of virtual reality in specificSolutionDisadvantage.docx
 
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docxWhat are the advantages of IPv6 over IPv4- Why is security often consi.docx
What are the advantages of IPv6 over IPv4- Why is security often consi.docx
 
What are some tax consequences related to a qualified pension plan- (P.docx
What are some tax consequences related to a qualified pension plan- (P.docxWhat are some tax consequences related to a qualified pension plan- (P.docx
What are some tax consequences related to a qualified pension plan- (P.docx
 
What are some primary reasons why an embedded system developer would u.docx
What are some primary reasons why an embedded system developer would u.docxWhat are some primary reasons why an embedded system developer would u.docx
What are some primary reasons why an embedded system developer would u.docx
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

What are the essential outcomes of secure system retirement- Justify y.docx

  • 1. What are the essential outcomes of secure system retirement? Justify your position. (Cybersecurity) Solution Computer security , also known as cybersecurity or IT security , is the protection of information systems from theft or damage to thehardware, the software, and to the information on them, as well as from disruption ormisdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional,accidental, or due to thembeing tricked into deviating from secure procedures. The field is of growing importance due to the increasing reliance on computer systems in most societies [4] and the growth of"smart" devices, includingsmartphones, televisions and tiny devices as part of theInternet of Things – and of the Internet and wireless network such as Bluetoothand Wi-Fi. Some organizations are turning to big data platforms, such as Apache Hadoop, to extend data accessibility and machine learning to detect advanced persistent threats.