1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
8

Consider the most important item among all the categories of information stored on your personal computer. As it applies to that

item of information (your information asset), identify an example of a corresponding threat, threat agent, vulnerability, exposure, risk, attack, and exploit.
Computers and Technology
1 answer:
GarryVolchara [31]3 years ago
5 0

Answer:

- Loss or corrupted data - virus, weak password discovered by brute force attack, web security vulnerability like SQL injection, misconfigured software and phishing.

Explanation:

Threats in a computer system, are actions that are caused by malicious softwares, to corrupt or steal information by attackers. The threat agents in computer systems are virus, rootkit, Trojan horse etc.

Vulnerability is a computer systems failure to mitigate weakness in the system like weak password to prevent unauthorised access.

Attacks like phishing involves using the internet to steal user personal information, when a user accesses a fake website. Exploits includes using the vulnerable system service for the gain of the attackers.

You might be interested in
Which subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control
Nataly [62]

The subscription service that complements App-ID by enabling you to configure the firewall to identify and control access to websites is  URL Filtering.

<h3>What is URL filtering?</h3>

The term URL filtering is known to function by looking at the similarities of all web traffic against a given URL filters.

Note that it is one that is made up of database of sites that users do access and as such, the subscription service that complements App-ID by enabling you to configure the firewall to identify and control access to websites is  URL Filtering.

Learn more about subscription from

brainly.com/question/14073216

#SPJ1

4 0
2 years ago
_____ creates a border or space that separates information.
KATRIN_1 [288]
A. Padding
*************
7 0
3 years ago
which option of the AutoCorrect tool enables you to add and delete words that do not follow abbreviation rules?
quester [9]

The replace text as you type is an option in the AutoCorrect tool that enables the user to add or delete words that do not follow abbreviation rules. Moreover, this is a convenient way to use especially if you are dealing with long string of words that only needs abbreviation.

3 0
4 years ago
Read 2 more answers
Can someone please help me? I have no clue what any of this is and how I'm going to find out 15 examples of these. It's due some
zvonat [6]
I am not really sure sorry
7 0
4 years ago
1. Engineers should not consult with experts if they do not know much about a problem.
Ganezh [65]
1. false
2. d
3. b
4. a
5. b
6.c
7. b
8.a
9. d
10. b
11. d
12.a 
13. c
14. c
15. a
5 0
3 years ago
Other questions:
  • Identify the correct XHTML syntax for inserting an image as a hyperlink from the options provided. A. book.gif B. C. D.
    9·1 answer
  • Hydropower uses moving water to do work, such as grinding grains in a mill. True False
    7·1 answer
  • A computer that no longer works after having minor repair works done to it may have been damaged by
    8·2 answers
  • A struggle between opposing forces or characters is
    14·1 answer
  • Can you tell me what is rast
    5·1 answer
  • Determine the exact output of the code $str = "The quick brown fox jumps over the the lazy dog"; echo strpos($str, 'fox');
    6·1 answer
  • Fill in the blank: _________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to fi
    9·1 answer
  • Consider the method get Hours, which is intended to calculate the number of hours that a vehicle takes to travel between two mil
    6·1 answer
  • How will understanding IT help me achieve my goals in life?
    14·1 answer
  • What are two differences between a wide angle lens and a telephoto lens?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!