1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
8

Consider the most important item among all the categories of information stored on your personal computer. As it applies to that

item of information (your information asset), identify an example of a corresponding threat, threat agent, vulnerability, exposure, risk, attack, and exploit.
Computers and Technology
1 answer:
GarryVolchara [31]3 years ago
5 0

Answer:

- Loss or corrupted data - virus, weak password discovered by brute force attack, web security vulnerability like SQL injection, misconfigured software and phishing.

Explanation:

Threats in a computer system, are actions that are caused by malicious softwares, to corrupt or steal information by attackers. The threat agents in computer systems are virus, rootkit, Trojan horse etc.

Vulnerability is a computer systems failure to mitigate weakness in the system like weak password to prevent unauthorised access.

Attacks like phishing involves using the internet to steal user personal information, when a user accesses a fake website. Exploits includes using the vulnerable system service for the gain of the attackers.

You might be interested in
How do I get rid of this?
kherson [118]

There Is an App that you downloaded that allows this. you have to find it and disable it

3 0
3 years ago
Read 2 more answers
Learning from and working collaboratively with individuals is being literate in which area
solniwko [45]
I think it should be civic literacy
7 0
3 years ago
Read 2 more answers
Which site acquired by Warner Bros. in 2011 allows users to rate movies and watch movie trailers?
mel-nik [20]
It was flixter.
hope this helps
7 0
3 years ago
Read 2 more answers
To test dns configuration by resolving a host name to ip address, which command or commands can you use
Helga [31]

ping, tracert or nslookup can all be used.

4 0
3 years ago
16
mihalych1998 [28]

Answer:

Connecting a new computer to the network.

4 0
3 years ago
Other questions:
  • You should use the longest possible shutter speed for all firework photographs.
    8·2 answers
  • You must have an active ____ to test external links.
    5·1 answer
  • In Python,The sum of the elements in a tuple can be recusively calculated as follows:The sum of the elements in a tuple of size
    5·1 answer
  • 4. An abstract data type is defined as _____.
    14·1 answer
  • Can someone please help with one? I will mark brainlest!!!
    5·2 answers
  • the term that is used to describe how many bits are used in each pixel to show the number of colours used
    11·1 answer
  • Evolucion de los sistemas operativos
    5·1 answer
  • State three reasons why users attach speakers to their computer​
    8·1 answer
  • Which diagram is NOT a good model of 3÷14?
    12·2 answers
  • Many programmers think object-oriented programming is a superior approach to procedural programming. Others think it adds a leve
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!