1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastova [34]
3 years ago
11

Give examples of how individuals can act as vulnerabilities, defenses, or threats to an information system

Social Studies
1 answer:
Fofino [41]3 years ago
6 0

An example of how individuals can act as vulnerabilities, defense or threats to an information system is this given scenario:

A person can be vulnerable when someone had stolen something from him or her and she or he can’t do anything about it because he or she can’t catch the guy alone because he is armed, the police who had saw the scenario had brought a gun with him for defense and started to chase the guy and he will be considered as the defense. The threat will be the burglar as if he wasn’t able to be caught, he could be a threat towards others if he tries to do it again.

You might be interested in
Muslims believe that God spoke to Muhammad through an angel.
viktelen [127]

Answer:

f

Explanation:

it is false because it was an angle that spoke to him not god his self

5 0
3 years ago
Read 2 more answers
Science fiction depicts how science, both real and imaginary, affects individuals and society. Please select the best answer fro
Len [333]
It is an absolute true statement that science fiction depicts how science, both real and imaginary, affects individuals and society. The correct option among all the options that are given in this question is the first option. Science fiction actually affects the imagination of the people and the children in a great way.
7 0
3 years ago
Read 2 more answers
Which law or policy provides resources for holistic services for survivors, prohibits United States funds going to any country u
Nataly_w [17]
TRAFFICKING VICTIMS PROTECTION RE AUTHORIZATION ACT OF 2013 provides holistic services for human trafficking survivors, prohibits United States funds from going to any country using child soldiers and imposes reporting compliance requirement on federal agencies. The Act,  which is a re- authorization of Trafficking Victim Protection Act of 2000 was put in place to establish a comprehensive approach to human trafficking by creating new criminal offences and to establish protection and assistance for victims.
4 0
3 years ago
Slavery in the Southern United States most closely resembles the
ollegr [7]
2 plantation system of the Caribbean
8 0
3 years ago
1. What was the job of the Committees of Correspondence?
noname [10]

A. To convince colonists to join the cause

6 0
3 years ago
Read 2 more answers
Other questions:
  • Hank is skilled at discriminating complex inner feelings and using them to guide his behavior. according to gardner, hank is adv
    9·1 answer
  • The orator and philosopher who called on romans to work together was ?
    5·1 answer
  • A shale is metamorphosed into four rock types: (1) a banded gneissic rock; (2) a schist with small mica crystals with a shiny as
    14·1 answer
  • What pact signed by Germany was part of a European policy of all of appeasement
    10·1 answer
  • Stan loves junk food and eats it every day in vast quantities. Stan's wife keeps telling him that research results show that he
    15·1 answer
  • Which civilization came to power in the andes mountain of south america
    5·1 answer
  • Similar to Durkheim, Robert Merton proposed that central to understanding deviance was the influence of norms on behavior. Diffe
    7·1 answer
  • What is a trading city?
    5·1 answer
  • What is energy? Choose the best answer.
    6·2 answers
  • Which technique ensures that personal characteristics that might affect the outcome of an experiment are scattered among researc
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!