Question: When we talk about logical security in information systems, we basically refer to: Keep the servers area closed Have battery backup Add fire extinguishers in
- When we talk about logical security in information systems, we basically refer to:
Keep the servers area closed
Have battery backup
Add fire extinguishers in each area
Create complex passwords
2. Protocols are extremely important and necessary for communication, therefore we can consider protocols as
Communication rules
Cables to connect two nodes
Storage devices
Topology type
3. Identify the impact that each of the cyberattacks has on computer systems.
_____Adware
______Spyware
______Malware
_______Ransomware
_______Back door
A. Lock the systems, then request a ransom to release the files.
B. It is accessed through logical ports that remain open.
C. Track the usage of each device.
D. Usually disrupts the operation of the equipment.
E. Collects information from the computer, and then transmits it to another node.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
