<span>1. Deleting files accidentally
</span>
2. Viruses and damaging malware
3. Mechanical damages of hard drive
4. Power failures
5. Theft of computer
6. Spilling coffee, and other water damages
7. Fire accidents and explosions
<span>Hope this helps.</span>
Answer:
a. Telnet transmissions are not encrypted.
Explanation:
Indeed, since <em>Telnet transmissions are not encrypted,</em> all the information sent, and even the characters typed in the telnet console are sent in clear text.
This is a security issue, since any other device in the same network will receive a copy of the information (packets) sent. For default, all the devices, except for the server expecting to receive the information, will discard the packets. However it is easy to actively <em>listen </em>and keep those packets, wich will contain the information in plain text and human readable.
Answer:
There is no direct return on investment in building security systems.
Security systems are detrimental to usability and can make IT systems less functional, and therefore less attractive to the customer.
There is pressure to reduce the time it takes to get a new IT product or system onto the market, so security systems are sacrificed in order to reduce the time-to-market.
Explanation:
Cyber security has always been challenging for the organizations. There have been groups which are always looking for loop holes in cyber security and hacks the details and asks the ransom to restore. IT systems have now been more complex in this era. Users are increasing every new day and network accounts security is more demanding. Computer connection are more complex and require special attention to control them. The obstacles in IT systems are of concern as there is need for dynamic IT solution to counter the challenging hackers. New programs and customized demand of IT systems need customized IT security systems.