1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gregori [183]
1 year ago
15

What name is given to any changes to the original data such as users manually modifying data, programs processing and changing d

ata, and equipment failures?.
Computers and Technology
1 answer:
nadezda [96]1 year ago
3 0

Modification is the name given to an attack that makes changes into original data such as users manually modifying data, programs processing and changing data, and equipment failures.

In modification attacks, only changes are made to original data without deleting it completely. Modification is basically a type of attack in the context of information security. This type of attack creates annoying situations and discords by altering existing data in data files, inserting new false information in the network and reconfiguring network topologies and system hardware.

Modification attack is mainly mounted against sensitive and historical data. Modification attacks target integrity of the original data with an intent of fabricating it.

You can learn more about ha-cker attack at

brainly.com/question/14366812

#SPJ4

You might be interested in
According to the Big Five Factors model, all but _____ are categories.
STatiana [176]
The Big Five Factors are: "Open, Agreeable, Stable, Conscientious, and Extraverted"

"Empathetic" is not one of the Big Five Factors.

<span>According to the Big Five Factors model, all but empathetic are categories.</span>
4 0
3 years ago
Write a valid HTML + Python page that will count numbered from 1 to 1,000,000?​
valentinak56 [21]

Answer:

I remember before the corona virus we used to do math at school

8 0
3 years ago
How can you make your MakeCode micro:bit program display either the letter<br> A or the letter B?
Liula [17]

Answer:

Use a random number and control structure to decide which letter is displayed.

Explanation:

8 0
2 years ago
Which type of network is created when you use encrypted tunnels between a computer or a remote network and a private network thr
Deffense [45]
<span>Virtual private network (VPN) is the answer</span>
3 0
3 years ago
Which function in Spell Checker should Patrick use if he makes the same mistake frequently when typing emails?
Olin [163]

Answer:

Explanation:

Click Spelling and Grammar and choose AutoCorrect,

4 0
3 years ago
Other questions:
  • List two ways that guest could be defined
    12·2 answers
  • This provides an easy method for workers to use their computers.
    11·2 answers
  • You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP addre
    13·1 answer
  • Analog signals consists of individual electric pulses that represents bits group together into bytes {True/False}
    13·1 answer
  • Una bombilla de 40 w de potencia está encendida durante 10 horas. Calcular la energía que ha consumido en julios y en kw·h.
    12·1 answer
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • There is an application which inputs hundred numbers from the user, if user enters a positive number it increments valid numbers
    6·1 answer
  • Give the algorithm and flowchart for following C code:
    6·1 answer
  • What group in the review tab contains the commands and to accept or reject changes made to a document
    14·2 answers
  • What was the first computer
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!