1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksju [112]
3 years ago
6

Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali

cious or not? Did the attack target you specifically or was it general and you were the unfortunate victim?
Computers and Technology
1 answer:
frutty [35]3 years ago
7 0

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

You might be interested in
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
Scott is inspired by one of his friends to write a research paper. how should he go about writing the research paper?
VLD [36.1K]

Scott first step is to ask people who are more educationally inclined in that filed about the work or use the internet or library to research on the topic or previous work that is done in that area.

<h3>What is a research paper?</h3>

This is known to be a kind of written essay on a topic that is done in depth.

Therefore, Scott first step is to ask people who are more educationally inclined in that filed about the work or use the internet or library to research on the topic or previous work that is done in that area.

Learn more about  research paper from

brainly.com/question/25257437

#SPJ1

4 0
2 years ago
To construct a battery with a current of 6 A, you would connect six 1 A cells
m_a_m_a [10]
A. in parallel.,<span>D. in series.</span>
6 0
3 years ago
Read 2 more answers
What is set of instructions executed by the computer?​
alexdok [17]

Answer:

code

Explanation:

code are set of instruction executed by the computer.

7 0
3 years ago
The slope and intercept pair you found in Question 1.15 should be very similar to the values that you found in Question 1.7. Why
iren2701 [21]
I don’t get the question
4 0
3 years ago
Other questions:
  • Which is an example of an active visual interface? a display indicating the amount of ammunition for the currently equipped weap
    13·2 answers
  • User authentication is a procedure that allows communicating parties to verify that the contents of a received message have not
    12·1 answer
  • Suction cup-type headlamp aiming equipment may be used on:
    11·1 answer
  • Within a Microsoft Windows environment, who has access rights to the Encrypting File System (EFS) features and functions?
    7·1 answer
  • The class attribute
    8·1 answer
  • During an upgrade for a new web server, Glen's company experienced a power surge. The power surge hit the new server, and now th
    10·1 answer
  • List the three control problems associated with competingprocesses and briefly define each.
    7·1 answer
  • on the road you are traveling,the pavement markings change from broken white lines to solid white lines between the lanes of tra
    5·1 answer
  • Match the parts of a CPU to their functions. Thanks in advance.
    7·1 answer
  • Which sentence indicates that Jeff is mentioning the visual synopsis in his proposal while planning a media project?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!