1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margarita [4]
3 years ago
8

Consider the most important item among all the categories of information stored on your personal computer. As it applies to that

item of information (your information asset), identify an example of a corresponding threat, threat agent, vulnerability, exposure, risk, attack, and exploit.
Computers and Technology
1 answer:
GarryVolchara [31]3 years ago
5 0

Answer:

- Loss or corrupted data - virus, weak password discovered by brute force attack, web security vulnerability like SQL injection, misconfigured software and phishing.

Explanation:

Threats in a computer system, are actions that are caused by malicious softwares, to corrupt or steal information by attackers. The threat agents in computer systems are virus, rootkit, Trojan horse etc.

Vulnerability is a computer systems failure to mitigate weakness in the system like weak password to prevent unauthorised access.

Attacks like phishing involves using the internet to steal user personal information, when a user accesses a fake website. Exploits includes using the vulnerable system service for the gain of the attackers.

You might be interested in
Which operating system became obsolete with the arrival of a more advanced graphical user interfaces
12345 [234]
The answer is Ms Dos
6 0
3 years ago
It is not possible to use keywords to search for themes. true or false.
Drupady [299]
False my dude .........................
3 0
3 years ago
Given the following code, what is output by the method call, mystery(6 * 8)? public static void mystery (int x[]) { System.out.p
____ [38]

Answer:

B

Explanation:

This question demonstrates the concept of method overloading

Method overloading means having different versions of the same method. In this case the method mystery() has three versions. The compiler is able to determine which method to call by their different parameters

The first implementation of mystery requires an array of integers as parameter

The second implementation requires an int variable

The third implementation requires a String

The Method call mystery(6 * 8) will output B because 6*8 evaluates to an integer which is the expected argument.

7 0
3 years ago
Distinguished between
VladimirAG [237]

Answer:

this one is not understandable you see but I think it's better than nothing to do with it tmzr I don't know what to say to someone who did you start the morning and you can not be able to get it to

4 0
2 years ago
What are the ethical implications of online social media after someone has died?
ZanzabumX [31]
<span>Think about the things people might have wanted private, but after death they have no control.</span>
8 0
3 years ago
Other questions:
  • Does toontown rewritten carry spyware or malware
    9·1 answer
  • Jason is creating a webpage on the basic parts of a camera. He has to use a mix of both images and content for the web page to h
    11·1 answer
  • If you want to import text into a DTP application that was first created in a word processing program, what must you do?
    9·2 answers
  • In a program called Nature's Notebook, citizen volunteers make and report observations about seasonal changes in plants and anim
    15·1 answer
  • Tips for being confident and entertaining when presenting?
    6·1 answer
  • Which of the following is considered both an input and output peripheral? Keyboard, Microphone, Speaker, Touchscreen monitor
    10·2 answers
  • How many of you got the right answer from this app​
    8·1 answer
  • I need help pls help me
    8·1 answer
  • The first version of Windows to have automatic updates from the Internet was _____.
    13·1 answer
  • When troubleshooting a network issue where a single host is unable to connect to the network, what is the first thing you should
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!