1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
6

What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticalit

y of the threat or vulnerability?
Computers and Technology
1 answer:
olchik [2.2K]3 years ago
6 0

Answer:

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

Explanation:

Every country homeland security system work for the betterment of the citizen and thus their main concern is to provide threat and risk-free source of communication. But then also there are may serious threats that can come to one's privacy.

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

You might be interested in
What is the<br> binary code<br> for<br> "DMS"?
koban [17]

Answer:

D= 01000100

M= 01101101

S= 01110011

Explanation:

7 0
3 years ago
What are the People that make the goods called
Marina CMI [18]
Those people would be called producers
4 0
3 years ago
When creating a firewall exception, what is the difference between opening a port and allowing an application through?
Mnenie [13.5K]
Every application has access to specific opened port. If you only make a exception for the specific application only that application can bypass the firewall.
6 0
4 years ago
HURRRYYYY PLZZ!!
vivado [14]

Answer: A. How much is this vehicle's resale value?

6 0
3 years ago
Read 2 more answers
Which part of the website address is its top-level domain name?
mr Goodwill [35]
The top-level domain is usually .com, .org, .net, and many more.
4 0
3 years ago
Other questions:
  • Why has unicode become the standard way of converting binary to text
    7·1 answer
  • What type of engineer is needed in the following scenario?
    7·2 answers
  • Describe the following types of data hazards. RAW WAR WAW
    13·1 answer
  • Question 4: What will be the output of the code? Show a complete analysis.
    6·1 answer
  • The show ip dhcp binding command displays _____. (Points : 5) the MAC table cache information
    7·1 answer
  • Eliza needs to share contact information with another user, but she wants to include only certain information in the contact. Wh
    9·2 answers
  • Miguel owns a tile business. He has two employees who work in a small office. One answers phones and schedules appointments. Ano
    11·2 answers
  • A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web s
    13·1 answer
  • 17. Ano ang tawag sa pahina ng Excel?
    12·1 answer
  • Write if true or false
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!