Which Accenture team builds custom code in a secure-by-design way, to be monitored and kept secure for an - Brainly.in (2024)

Advertisem*nt

Advertisem*nt

The Information Security Team at Accenture builds custom code in a secure-by-design way, to be monitored and kept secure for an entire lifecycle.

  • Accenture's Information Security team protects its data, operations, enterprises, as well as client, business partner, and employee information.
  • It requires a laser-focused approach to protect the information of Accenture, its clients, and its employees.
  • Accenture's Information Security team keeps all client data and information for which the company is responsible-secure through a rigorous and industrialized approach, including technical architecture, governance, operational infrastructure, and behavioral change programs.
  • Security is at the top of the team's priorities and all of its processes and programs support this.

#SPJ2

Advertisem*nt

Advertisem*nt

Answer:

Security Operations

Explanation:

Advertisem*nt

Advertisem*nt

New questions in CBSE BOARD XII

Explain Memory and its type?​​

How does magnesium reacts with water????​?​

பகுபத உறுப்புகளுள் இடம் பெறும் பகுதியை விவரித்து எழுதுக. ​

A and B are partners in business.their capital's at the end of year were rs.48000 & rs.36000 respectively. during the ended March 31st 2015 A's dr…awing and B's drawing the year were rs 8000 & 12000 respectively.profits before charging interest on capital during the year were rs. 32000 calculate interest on partners capital @10% pa.​

12. A and B are partners sharing profits and losses in the ratio of 3: 1. Liabilities Assets A's Capital B's Capital Rs 90,000 30,000 Rs Drawings: A 1…2000 B 6000 18,000 1,02,000 Sundry Assets Total 1,20,000 Total 1,20,000 Profit for the year ended 31st March, 2021 24,000 was divided between the partners in their profit sharing ratio, but interest on capital at 5% p.a. and on drawings at 6% p.a. was inadvertently ignored. Give the necessary adjustment entry for the adjustment of interest. Interest on drawings may be calculated on an average basis for 6 months.​

Which Accenture team builds custom code in a secure-by-design way, to be monitored and kept secure for an - Brainly.in (2024)

FAQs

Which Accenture team builds custom code in a secure-by-design way, to be monitored and kept secure for an - Brainly.in? ›

The Information Security Team at Accenture builds custom code in a secure-by-design way, to be monitored and kept secure for an entire lifecycle.

What is the one way that Accenture can ensure that the cloud is secure for a client? ›

Expert-Verified Answer. Accenture can ensure that the cloud is secure for a client by utilizing special software to analyze all data transact6ions ( Option C ). In option A, blocking insecure configurations is not always possible before they are made. In this case, the risk of getting this data encrypted is very high.

What is Accenture's approach when it comes to helping our clients with security Brainly? ›

embed security in all aspects of the client work, solving even the most complex of the client's cyber challenges.

Which Accenture team builds custom code in a secure by design way to be monitored? ›

Expert-Verified Answer. The Information Security Team at Accenture builds custom code in a secure-by-design way, to be monitored and kept secure for an entire lifecycle. Accenture's Information Security team protects its data, operations, enterprises, as well as client, business partner, and employee information.

Which security capability is responsible for securing the software Accenture? ›

Provider shall use current Industry Standard encryption, TLS (Transport Layer Security) minimum version 1.2, to encrypt Accenture Data that is in transit.

Which Accenture tool will help the client select the best type of platform for overcoming this challenges? ›

myConcerto brings together the strength of Accenture in a single, proprietary platform that simplifies and accelerates technology-led business transformation.

Which goal is Accenture trying to achieve by investing in security training for Accenture people keeping ourselves? ›

They are trying to achieve the goal of cultivating security habits and being aware of cyber threats.

Why does Accenture make training on client security data security and internal security monitoring? ›

Answer: Accenture Keeps client data protected by preventing security breaches. Explanation: Accenture's Information Security Client Data Protection program furnishes client groups with a normalized approach, security controls, and the devices important to guard data.

Why is it a priority to ensure Accenture's employees are knowledgeable about maintaining corporate cyber security practices? ›

1 - Humans are most often the weakest link in any security program. 2 - Fortune 100 companies are the most likely targets for security failure. 3 - Employees must respond to auditors conducting risk and compliance reviews. 4 - It is important that Accenture employees finish their E&C training.

In which way can one of Accenture's red team use its state of the art tools and capabilities to help the client? ›

your answer is here. Explanation: An international airport approaches Accenture to help identify their existing security vulnerabilities. Accenture's Red Team uses its state-of-the-art tools and capabilities to help the client to create in-depth simulations to help users steer clear of cyber security threats.

What should Accenture's security team focus on to address this particular client's concern? ›

What shouldAccenture's security team focus on to address thisparticular client's concern? Answer:Accenture has developed accelerators that can deploy specific securitycontrols to cloud environments in just a few hours, thereby reducing costs.

Who is responsible for application security in software as a service SaaS service model? ›

SaaS: SaaS vendors are primarily responsible for the security of their platform, including physical, infrastructure and application security. These vendors do not own the customer data or assume responsibility for how customers use the applications.

Which vulnerabilities are part of the owasp top ten Accenture? ›

OWASP Top 10 Vulnerabilities
  1. Injection. Injection occurs when an attacker exploits insecure code to insert (or inject) their own code into a program. ...
  2. Broken Authentication. ...
  3. Sensitive Data Exposure. ...
  4. XML External Entities. ...
  5. Broken Access Control. ...
  6. Security Misconfiguration. ...
  7. Cross-Site Scripting. ...
  8. Insecure Deserialization.

What is involved in secure software development? ›

Generally speaking, a secure SDLC involves integrating security testing and other activities into an existing development process. Examples include writing security requirements alongside functional requirements and performing an architecture risk analysis during the design phase of the SDLC.

Which Accenture client is implemented enterprise platform and is looking for a tool that will help monitor? ›

Answer: Accenture MyConcerto Platform enterprise should be implemented by the client to monitor the ongoing performance.

Which Accenture tool would best help the project lead begin the process? ›

Expert-Verified Answer. The best Accenture tool to help the project lead begin is myConcerto. Accenture myConcerto is an integrated tool for enterprise transformation. myConcerto is a tool for streamlining and speeding up innovation-driven organizational change.

Which tool is used in Accenture? ›

Accenture uses the ServiceNow platform for digital service delivery across the enterprise.

What are key objectives of DevOps at Accenture What are key objectives of DevOps at Accenture? ›

The Accenture DevOps Platform is a cloud-hosted development environment for continuously testing, releasing and maintaining applications. It includes preconfigured tools, test environments, automation blueprints, leading practices and security features.

What are the three main goals of security? ›

Confidentiality, integrity and availability together are considered the three most important concepts within information security. Considering these three principles together within the framework of the "triad" can help guide the development of security policies for organizations.

Which strength can Accenture apply to help a global telecom solve security problems? ›

Answer: Only understanding of the government and tenacity can be applied to aid a worldwide telecom.

When security is part of the design process and built in from the start? ›

Security defense that is confidential, integrous, and available when security is an ongoing process rather than a one-and-done when security is part of the design process and built in from the start security designed with multiple levels of fail-safe.

What do Accenture cyber fusion center offer client to help them think differently about the security journey ahead of them? ›

The correct answer is managed security services, advanced analytics, intelligent automation technologies and integrated cyber defense.

What is security delivery associate in Accenture? ›

They are “the voice of the customer” and as such are responsible for ensuring the other operational delivery functions, PM, and Sales where appropriate, understand their clients' requirements, their priorities, and their requests to not only provide a consistent high-quality MxDR Service, but where continuous ...

What is the best way to ensure data security in the cloud? ›

How to secure your information in the cloud
  1. Use a Cloud Service That Encrypts. ...
  2. Read the User Agreements. ...
  3. Set Up Your Privacy Settings. ...
  4. Use Strong Passwords. ...
  5. Use Two-Factor Authentication. ...
  6. Don't Share Personal Information. ...
  7. Don't Store Sensitive Information. ...
  8. Use a Strong Anti-Malware Program.

How do you ensure that the cloud infrastructure is secure? ›

Use the following six cloud security tips to secure your storage.
  1. Manage Data Access. ...
  2. Classify Data. ...
  3. Encrypt, Encrypt, Encrypt! ...
  4. Enable Versioning and Logging. ...
  5. Do Not Allow Delete Rights (or Require MFA for Delete) ...
  6. Continuously Check for Misconfigurations and Anomalies.

Which Accenture tool can help advise this client on the right cloud solution? ›

myNav encapsulates Accenture's experience of over 36,000 cloud projects to take the guesswork out of your journey on the Cloud Continuum. It has comprehensive capabilities to help you: Migrate your IT landscape by selecting the right cloud infrastructure for your needs to get to the cloud quickly.

Which of the following is a way you could help secure your data on a cloud service? ›

Encrypt.

Generally encryption works as follows: You have a file you want to move to a cloud, you use certain software with which you create a password for that file, you move that password-protected file to the cloud and no one is ever able to see the content of the file not knowing the password.

Who's responsible for the data security in cloud and what are the responsibilities of each parties? ›

The responsibility here is a shared one; shared between the organisation, the cloud provider, and all its users. While data can be safe in the cloud, everyone with access to that data affects whether it remains safe. Cloud security must be everyone's responsibility.

Who is responsible for data security in the cloud? ›

A number of different teams within an organization could be responsible for cloud security: the network team, security team, apps team, compliance team or the infrastructure team. However, cloud security is also a shared responsibility between the broader organization and its cloud vendor.

What are the two main methods used to ensure data security? ›

Authentication and authorization are essential components of data protection, ensuring that only authorized individuals can access your data.

Which of the following security strategies would be best suited for a cloud infrastructure? ›

Encrypt Data in Motion and At Rest

Encryption is a key part of any cloud security strategy. Not only should organizations encrypt any data in a public cloud storage service, but they should also ensure that data is encrypted during transit—when it may be most vulnerable to attacks.

Which are security management areas for securing services in the cloud computing? ›

Security management in the cloud is a set of strategies designed to allow a business to use cloud applications and networks to their greatest potential while limiting potential threats and vulnerabilities. This is often done with several independent tactics: Identifying and assessing cloud services.

What security measures can be taken to secure cloud services? ›

Use Encryption

Encryption is a vital tool for cloud security. It helps protect data from being accessed by unauthorized individuals. Encrypted data is transformed into a code that only someone with the proper key can decode. This makes it more difficult for hackers to access sensitive data.

What is a Accenture's approach when it comes to helping our clients with security? ›

Embed security in all aspects of the client work, solving even the most complex of the client's cyber challenges. Create a universal security solution to fit the needs of all clients. Accenture's unique platform can be embedded in any client architecture.

What is the recommended planning tool in Accenture? ›

Accenture's Anaplan practice overview

Anaplan's connected planning platform empowers cross functional users throughout the enterprise to holistically plan, budget, and seamlessly interact with the cloud based enterprise reporting platform to realize new value.

How to keep your data secure in term of cloud security and cybersecurity? ›

Make sure your CSP offers strong authentication measures to ensure proper access through strong password controls and multi-factor authentication (MFA). The CSP should also support MFA for both internal and external users and single sign-on, so users can just log in once and access the tools they need.

What steps can organizations take to make their cloud based systems more secure? ›

  1. Deploy Multi-Factor Authentication (MFA) ...
  2. Manage Your User Access to Improve Cloud Computing Security. ...
  3. Monitor End User Activities With Automated Solutions to Detect Intruders. ...
  4. Create a Comprehensive Off-boarding Process to Protect against Departing Employees. ...
  5. Provide Anti-Phishing Training for Employees on a Regular Basis.
May 30, 2023

Which of the following is a common security risk associated with cloud services? ›

Data loss is the most common cloud security risks of cloud computing. It is also known as data leakage. Data loss is the process in which data is being deleted, corrupted, and unreadable by a user, software, or application.

Top Articles
Latest Posts
Article information

Author: Dong Thiel

Last Updated:

Views: 6162

Rating: 4.9 / 5 (59 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Dong Thiel

Birthday: 2001-07-14

Address: 2865 Kasha Unions, West Corrinne, AK 05708-1071

Phone: +3512198379449

Job: Design Planner

Hobby: Graffiti, Foreign language learning, Gambling, Metalworking, Rowing, Sculling, Sewing

Introduction: My name is Dong Thiel, I am a brainy, happy, tasty, lively, splendid, talented, cooperative person who loves writing and wants to share my knowledge and understanding with you.