1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksju [112]
3 years ago
6

Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali

cious or not? Did the attack target you specifically or was it general and you were the unfortunate victim?
Computers and Technology
1 answer:
frutty [35]3 years ago
7 0

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

You might be interested in
Which of the following is a quantitative question?
slamgirl [31]
D it gives 2 options
3 0
3 years ago
Read 2 more answers
Identify the careers that require a college degree
Vikentia [17]
Doctor or teacher or an engineer

8 0
3 years ago
Write a for loop in python that prints 10 random numbers between 1 and 100 inclusive.
Goshia [24]

import random

for x in range(10):

   print(random.randint(1,100))

8 0
3 years ago
? Lodo con nutrientes que fertiliza las cosechas¿​
meriva

Answer:

I don't understand sorry

4 0
3 years ago
The laptop has a built-in wireless adapter or the wireless adapter is physically installed on a computer and it does not appear
tino4ka555 [31]

Answer:

The wireless adapter driver software.

Explanation:

All computer systems are composed of hardware and software components. The hardware components is driven by the software components.

The operating system software is the mainly software component of the computer system, which creates the proper environment to run application software. It also runs the activities the hardware with the connection called the kernel.

Kernels are device drivers that runs the hardware components. The wireless adapter is the hardware that needs the wireless adapter driver to be recognised run by the computer.

6 0
3 years ago
Other questions:
  • 1 what elements of composition are under your control in photoshop
    13·1 answer
  • Question 16 (2 points) Question 16 Unsaved
    11·1 answer
  • Bitlocker uses the computer's __________ chip to store encryption keys and does not rely on individual user credentials. securit
    10·1 answer
  • Who played a leading role in perfecting movable type for printing?
    15·1 answer
  • Memory: 5 bit addresses Cache: 8 blocks All memory locations contain valid data If the memory location is 15. What is the Binary
    6·1 answer
  • How do I install free premium iOS apps?
    11·1 answer
  • What is the number reason for conflict on a team?
    12·1 answer
  • Use the provided MS-Excel template to note entries for each .pcap file in Wireshark that are of interest, as well as your assess
    5·1 answer
  • How is binary number related to real number?
    11·2 answers
  • A computer is the __________ of an attack when it is used to conduct an attack against another computer.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!