1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
8

Consider the most important item among all the categories of information stored on your personal computer. As it applies to that

item of information (your information asset), identify an example of a corresponding threat, threat agent, vulnerability, exposure, risk, attack, and exploit.
Computers and Technology
1 answer:
GarryVolchara [31]3 years ago
5 0

Answer:

- Loss or corrupted data - virus, weak password discovered by brute force attack, web security vulnerability like SQL injection, misconfigured software and phishing.

Explanation:

Threats in a computer system, are actions that are caused by malicious softwares, to corrupt or steal information by attackers. The threat agents in computer systems are virus, rootkit, Trojan horse etc.

Vulnerability is a computer systems failure to mitigate weakness in the system like weak password to prevent unauthorised access.

Attacks like phishing involves using the internet to steal user personal information, when a user accesses a fake website. Exploits includes using the vulnerable system service for the gain of the attackers.

You might be interested in
Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characte
Stels [109]
That would be your name and then you date of birth 
6 0
3 years ago
Read 2 more answers
What is this type of car?
Butoxors [25]
Nissan titan crew cab sv png
4 0
4 years ago
Read 2 more answers
The uses of computer in the field of education are; ​
IRINA_888 [86]

Answer: One of the most common applications of computers in education today involves the ongoing use of educational software and programs that facilitate personalized online instruction for students. Programs like Ready use computers to assess students in reading and math.

Explanation:

6 0
3 years ago
Which part of the faucet is the aerator?
sammy [17]
A faucet aerator<span> (or tap aerator) is often found at the tip of modern indoor water </span>faucets<span>.</span>
8 0
3 years ago
In cell j6, enter a formula to determine the cost of gas if the customer chose that option as indicated in column i. if the cust
Alex73 [517]

Answer:

a t t i c

Explanation:

7 0
3 years ago
Other questions:
  • Explain the design and development proccess?
    15·1 answer
  • Acomputer with a domain name is called a
    8·1 answer
  • How does white balancing affect the images recorded by a camera?
    15·1 answer
  • Help me for this question
    8·1 answer
  • The bus width and bus speed together determine the bus's ____ or bandwidth; that is, the amount of data that can be transferred
    6·1 answer
  • Which of the following is most likely to require use of a server, desktop, and industry-specific handheld computer, and is most
    8·1 answer
  • When you evaluate the use of digital media, how has it affected the newspaper business? The rise of digital media has caused new
    15·1 answer
  • A unique aspect of Java that allows code compiled on one machine to be executed on a machine of a different hardware platform is
    8·1 answer
  • What do we call a statement that displays the result of computations on the screen
    12·2 answers
  • Who completes the action item form in a team meeting
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!