1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
8

Consider the most important item among all the categories of information stored on your personal computer. As it applies to that

item of information (your information asset), identify an example of a corresponding threat, threat agent, vulnerability, exposure, risk, attack, and exploit.
Computers and Technology
1 answer:
GarryVolchara [31]3 years ago
5 0

Answer:

- Loss or corrupted data - virus, weak password discovered by brute force attack, web security vulnerability like SQL injection, misconfigured software and phishing.

Explanation:

Threats in a computer system, are actions that are caused by malicious softwares, to corrupt or steal information by attackers. The threat agents in computer systems are virus, rootkit, Trojan horse etc.

Vulnerability is a computer systems failure to mitigate weakness in the system like weak password to prevent unauthorised access.

Attacks like phishing involves using the internet to steal user personal information, when a user accesses a fake website. Exploits includes using the vulnerable system service for the gain of the attackers.

You might be interested in
Prepare algorithm and draw a corresponding flowchart to compute the mean value of all odd numbers between 1 and 100 inclusive.​
Serjik [45]

Answer:

it has to be 35 it's definitely 35

3 0
3 years ago
Ví dụ sau sẽ in ra dữ liệu của x là kiểu gì ?
Virty [35]
Sjsjsjsjsjdhshshshshususs
7 0
2 years ago
Which of these network connections would allow your smartphone to sync your photos to your online account? Choose all that apply
Anika [276]

Answer:

A & D

Explanation:

Wifi or IEEE 802.11a/n/g  is a wireless network medium used for communication between devices in a network (or the internet). It is used to transfer video, text, graphic, audio and all other types of files.

Cellular is a mobile networking technology used to make wireless communication over a large area of land called cell, between devices in a network or a remote network.

Both cellular and wifi connections are used to synchronize smartphones to online accounts and allows for data backup and retrieval.

5 0
3 years ago
which tag does not display the text in the browser window and makes the sources code mode readable ?​
maxonik [38]

Answer:

HTML comments are not displayed in the browser, but they can help document ... You can add comments to your HTML source by using the following syntax: <! ... you can comment out HTML lines of code, one at a time, to search for errors: ... Use the HTML comment tag to make a comment out of the "This is a comment" text.

Explanation:

Gimme brainliest right now.

3 0
3 years ago
The command prompt is currently in the Old_Data folder. Which two commands can you use to create a new folder called Archive?
Ksivusya [100]

Answer:

mkdir Archive

Explanation:

Assuming that you want to create the new folder within the Old_Data folder then you would only need one command which is the mkdir command. This will create the folder inside the current location which in this case is the Old_Data folder. Like so...

mkdir Archive

Otherwise, you would first need to navigate to the folder that you want to create the new folder. You do this using the "cd /" to navigate to previouse directory and then to the one you want.

7 0
3 years ago
Other questions:
  • A bunch of computer scientists take over an island and start their own country. They want the license plates to use binary numbe
    11·1 answer
  • Which of the following sentences is written in the active voice
    12·2 answers
  • The small diagonal arrow in some command groups lower-right corner is a __________.
    10·1 answer
  • Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa
    5·1 answer
  • You need to write a loop that will repeat exactly 125 times. which is the preferred loop construct to use?
    12·1 answer
  • By default, the Windows desktop displays
    6·1 answer
  • An interrupt priority scheme can be used to ____. allow the most urgent work to be finished first make it possible for high-prio
    14·1 answer
  • Which guideline would not promote energy conservation?
    15·1 answer
  • 100 POINTS PLEASE HELP Type the correct answer in the box. Spell all words correctly.
    15·1 answer
  • What would a good digital citizen do if he sees his classmate left her email account open on a school computer by mistake?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!