1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
8

Consider the most important item among all the categories of information stored on your personal computer. As it applies to that

item of information (your information asset), identify an example of a corresponding threat, threat agent, vulnerability, exposure, risk, attack, and exploit.
Computers and Technology
1 answer:
GarryVolchara [31]3 years ago
5 0

Answer:

- Loss or corrupted data - virus, weak password discovered by brute force attack, web security vulnerability like SQL injection, misconfigured software and phishing.

Explanation:

Threats in a computer system, are actions that are caused by malicious softwares, to corrupt or steal information by attackers. The threat agents in computer systems are virus, rootkit, Trojan horse etc.

Vulnerability is a computer systems failure to mitigate weakness in the system like weak password to prevent unauthorised access.

Attacks like phishing involves using the internet to steal user personal information, when a user accesses a fake website. Exploits includes using the vulnerable system service for the gain of the attackers.

You might be interested in
Tell me something about "nuclear power station" (help)​
iren2701 [21]

Answer:

A nuclear power plant is actually a thermal power station in which the heat source is a nuclear reactor.

Explanation:

Ask me more if you want more.

8 0
3 years ago
What does the security element of non-repudiation mean in e-commerce cybersecurity? A. Data needs to be available at all times.
VARVARA [1.3K]

Answer:

Non-repudiation is the assurance that someone cannot deny the validity of something. Non-repudiation is a legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data

Explanation:

8 0
4 years ago
Practice with CSS. a. Write the CSS for an HTML selector footer with the following characteristics: a light-blue background colo
Nitella [24]

Answer:

Explanation:

/*# represents ID selector

*/

#feature{

font-family: 'Arial';

font-size: 10px;

color: red;

background: white;

width: 80%;

filter: drop-shadow(30px 10px 4px #4444dd);

}

8 0
3 years ago
When an application contains an array and you want to use every element of the array in some task, it is common to perform loops
Elodia [21]

Answer:

 Option A(True) is the correct answer for the above question.

Explanation:

  • An array is used for the collection variables which is of the same type and uses memory in continuous Passion for the storage.
  • When any user wants to use the array then he needs to declare the size and type of the array because array holds the same type of data.
  • For example, int a[5] is an array of integer variable whose name is 'a' and the size is 5 in c language.
  • Anyone can use the array with the help of the index value of the array. The starting index value is 0 and the ending index value is (size-1) for any array.
  • The user can use it by the help of loop, in which the loop variable refers to the index of the array and it starts from 0 and ends in the (size of the array-1).
  • It is because the loop executes the same line multiple times.
  • The above statement also wants to state, which is defined as above. Hence the above statement is true which is referred by option A. Hence option A is the correct answer.
7 0
3 years ago
How can photography allow us to view the world around us in different ways?
Nimfa-mama [501]
Photography allows us to view the world around us in different ways, by giving us the sense and feel of what others feel, Photography is art. You are able to use photography to define actions, for example happiness in a marriage or happiness in children playing at the park. Photography also allows you to explore and discover new things, and make something out of that. It makes you think a bout different ways to change the world around you, how do you define the world?
7 0
3 years ago
Read 2 more answers
Other questions:
  • Nicole wants to create a database to collect information about sales transactions. She would like to use the database to look up
    6·2 answers
  • What is an enterprise system
    14·2 answers
  • )What is proceduralabstraction, and why is it important inComputer Science
    14·1 answer
  • One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or
    9·2 answers
  • Give three reasons why you think Clip Art is so widely used in many different types of documents.
    13·2 answers
  • Research for a project should be based on?
    7·2 answers
  • Cómo se transmite la voz en el sistema telefónico?
    12·1 answer
  • Determine the factors using computer failures and defects​
    8·1 answer
  • PLEASE HURRY!!<br> Look at the image below!
    11·2 answers
  • Sistem komponen mekanikal yang terdapat pada sebuah basikal?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!