answersLogoWhite

0

Describe methods in securing data

Updated: 11/22/2022
User Avatar

Wiki User

13y ago

Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: Describe methods in securing data
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Methods of securing heavy cargoes such as locomotives?

non-sense


Which three protocols describe methods that can be used to secure user data for transmission across the internet?

*ipsec*ssl*https


What are the methods in collect data?

There are five different methods in collecting data. The methods in data collect are registration, questionnaires, interviews, direct observations, and reporting.


What are bondage techniques?

Methods for securing someone or something to restrict or prevent movement or escape.


How Do You describe the shape of a data set?

You describe the shape, not of the data set, but of its density function.You describe the shape, not of the data set, but of its density function.You describe the shape, not of the data set, but of its density function.You describe the shape, not of the data set, but of its density function.


What process is involved in in all methods of testing hypotheses?

Data Collection is involved in all methods of testing hypotheses.


When speaking of passwords and authenticators?

Passwords are strings of characters used to authenticate users' identities. Authenticators are devices or methods used to confirm the identity of a user seeking access. Both are essential for securing accounts and data from unauthorized access.


What is used to describe data and what is used to display data in computer?

what is used to describe data and what is used to display data in compuier


What are the methods of presenting data?

two methods of presenting data 1.tabular form 2.pictorial form


Describe the area of structured types in an object oriented database and give an example of their use?

Data is stored as objects and can be interpreted only using the methods specified by its class.


What is storage management?

Storage management is the term used to describe the various methods and technologies used to store data. This includes security, process automation, and traffic analysis.


List and describe three methods of nonpoint and pollution control?

Best Management Practices (BMPs): Implementing BMPs involves strategies such as controlling erosion, managing stormwater runoff, and promoting ecosystem restoration to minimize nonpoint source pollution. Riparian buffers: Planting and maintaining vegetation along water bodies helps filter pollutants, reduce sediment runoff, and provide habitat for wildlife, thus serving as a natural way to control nonpoint source pollution. Urban planning and zoning regulations: Implementing land use policies that promote smart growth, limit impervious surfaces, and encourage green infrastructure can help reduce nonpoint source pollution from urban areas by managing development in a sustainable manner.