1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Finger [1]
3 years ago
10

A small business has suffered from a cyber attack, what could be the resultant damage​

Computers and Technology
1 answer:
frutty [35]3 years ago
4 0

Answer:

Cyber Attacks can damage small or big business. Different kinds of attacks will lead to the different losses. some of the most common attacks are

  • DOS Attack
  • Bruteforce Attack
  • DDOS Attack
  • XSS Attack
  • API Attack
  • Network Attacks
  • Identity and Token theft attack
  • Man in the middle attacks
  • Application Level Attacks

Each attack can impact different domain and different level of damages. The biggest damage can be loss of reputation and monetorial losses. It can eventually invite law suites and can make company go bankrupt.

Explanation:

Following damages can be seen with cyber attacks.

<u><em>Loss of Reputation : </em></u>Loss of reputation is the worst damage that any cyber attack can create. This will  result in the business losses and also result in irreversible damage to existing customer base and also it will spoil the market value.

<u><em>Loss of Corporate Information:</em></u> Attackers can use the corporate information which can consist of customers data, unwanted lawsuits and also company’s employees details. Data recovery may not be possible once the attacker has full corporate access.

<u><em>Loss of Identity: </em></u>Once the personal information is lost then Hackers can use personal information for impersonation, and identity theft. Identity theft is more dangerous as it is used for illegal activities.

Cyber-attacks can disrupt your business activities and it will include as below

<u><em>Loss of Data : </em></u> Successful cyber attack can damage the data and even can corrupt the data which will be of no use.

<u><em>Loss of Infrastructure :</em></u> Servers, computers, databases can be disrupted with a cyber-attack which can be irreversible and even be more disastrous as physical infrastructure is impacted.

<u><em>Extortion losses :</em></u> Attackers can threaten to disclose sensitive data and can intern ask for ransom payment.

<u><em>Lawsuits : </em></u>If the customer’s data is exposed or used for illegal business then it will invite huge lawsuits.

<u><em>Notification Policy :</em></u> If data is breached then it is also important to notify the effected users and the next remedy taken to resolve it.

<u><em>Loss of Business :</em></u> Cyber attacks can create business losses and also will eventually affect existing and new customers.

You might be interested in
Write a python program that will read a number (num) and display all the numbers divisible by 3 or 5
coldgirl [10]

DIVISIBLE BY 10

Explanation:

BECAUSE I DONT KNOW

6 0
3 years ago
I'm not sure how to do these. By the way, it has to be python.
frutty [35]

Task 1:

float75 = float(75)

string75 = "75"

# you cannot add together a number and a string because a string has no inherent numerical value like a number does.

Task 2:

num = float(input("Enter a number"))

print(num**2)

Task 3:

num = int(input("Enter an integer: "))

print("When you divide "+str(num)+" by 7, the quotient is "+str(num//7)+" and the remainder is "+str(num%7)+".")

Task 4:

gigs = int(input("How many gigabytes does your flashdrive hold? "))

print("A flashdrive with "+str(gigs)+ " gigabyte(s) holds "+str(gigs*8589934592)+" bit(s).")

For task 4, you might have to change the number 8589934592 to something else. I'm not entirely sure how many bits are in a gigabyte. I hope this helps though.

6 0
3 years ago
What are the 5 general terms of the fair use rule
Andrews [41]

the purpose and character of your use.

the nature of the copyrighted work.

the amount and substantiality of the portion taken, and.

the effect of the use upon the potential market

In its most general sense, a fair use is any copying of copyrighted material done for a limited and “transformative” purpose, such as to comment upon, criticize, or parody a copyrighted work. Such uses can be done without permission from the copyright owner

the nature of the copyrighted work; the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and. the effect of the use upon the potential market for or value of the copyrighted work

uwu hope dis halpz!

5 0
3 years ago
When saving a file, you must provide a valid file name that adheres to specific rules, referred to as _______________.
Naya [18.7K]

Answer:

a. file-naming conventions

Explanation:

File names need to follow certain criteria and constraints. Examples include:

  • File names must not start with special symbols.
  • File names can consist of letters,digits and special characters such as _.
  • File name can contain an extension after a dot sign.
  • File names must not be duplicates of an existing file.

Such constraints form part of file-naming conventions.

  • file-path represents the complete path to the file in the directory structure.
  • disk partition segments a hard disk into multiple volumes.
  • file-path starts from the root directory and spans one or more subdirectories to the location of the actual file.
6 0
3 years ago
SUB2 WWolfPlays on yt <br><br><br> true or false if false ima cri
VMariaS [17]

Answer:

True

Explanation:

Plz brainlist

5 0
2 years ago
Read 2 more answers
Other questions:
  • Which result would support the particle theory of light?
    6·2 answers
  • Interest rate risks would be most relevant to what purchase?
    7·2 answers
  • According to a recent study, more than 75 percent of teens between the ages of twelve and seventeen in the United States have a
    11·2 answers
  • If you buy a 20 dollar thing with a 25 dollar gift card, do you still have 5 dollars?
    7·2 answers
  • What are two advantages of encrypting data stored in the computer system?
    5·1 answer
  • What are the tyoe of typical application of mainframe computer<br>​
    6·1 answer
  • O Why was the Internet originally constructed? Oto enable researchers to communicate
    6·2 answers
  • Manfred wants to include the equation for the area of a circle in his presentation. Which option should he choose?
    11·2 answers
  • What is the output of the following code:
    12·1 answer
  • Summary about Interface Design in system analysis
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!