Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

What is a release methodology? Why is version control important? What are some k

ID: 3574678 • Letter: W

Question

What is a release methodology? Why is version control important? What are some key issues that you must address when considering data backup and recovery? What are the six security levels? Provide examples of threat categories, attacker profiles, and types of attacks. What is a release methodology? Why is version control important? What are some key issues that you must address when considering data backup and recovery? What are the six security levels? Provide examples of threat categories, attacker profiles, and types of attacks. What is a release methodology? Why is version control important? What are some key issues that you must address when considering data backup and recovery? What are the six security levels? Provide examples of threat categories, attacker profiles, and types of attacks.

Explanation / Answer

Release methodology is proccess of selecting most efficient and more understandebel release from all relasses for best quality product.

In an release methodology non-critical change held till they can implemented at same time.
Any changes did in system it will be documented and it used as new version for system this is maintenance release.
At the time of using release methodology numbering for version is used to distinguish from other versions.
Release methodology also reduce the documentation problem version control track the release and when versions are released it will be archived by librarian of system who is responsible for all old and new versions.
In version control there is facility to rollback the changes if any major system failure occurs.
Some of version control tools are svn and git that is take care of all releases.

Key issues that you must address when considering data backup and recovery

1) network failure
2) media failure
3) statement failure
4) user process failure and user errors
5) instance failure

Security levels
1) physical security.
2) network security.
3) application security.
4) file security.
5) user security.
6) procedural security.

Types of threat:-
1) physical
2) electrical
3) environmental
4) maintenance

Type of attacks:-
1) reconnaissance attack
2) active attack
3) passive attack
4) insider attack
5) phishing attack
6) distributed attack
7) spoof attack
8) hijack attack
9) buffer overflow attack
10) packet capturing attack
11) ping sweep attack
12) dns query attack

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote