1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slava [35]
3 years ago
7

Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali

cious or not? Did the attack target you specifically or was it general and you were the unfortunate victim?
Computers and Technology
1 answer:
Andrei [34K]3 years ago
8 0

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

You might be interested in
entry that has the address of 192.168.101.0 and the wildcard mask of 0.0.0.255. What is the range of IPv4 addresses that will be
svp [43]

Answer:

192.168.101.0 through 192.168.101.255 is the correct answer.

Explanation:

The following answer is correct because the address of the ACL entry is 192.168.101.0 and 0.0.0.255 is the wildcard mask then, the range of the IPv4 addresses is 192.168.101.0 through 192.168.101.255 that affected by the ACL.

ACL is referred as the access control list that acts as the firewall which secures the VPC network of the user.

6 0
3 years ago
Windows displays a(n)
pochemuha

Answer:

system I hope tis is right

7 0
3 years ago
Can someone please answer these questions! Thank you :)
kolbaska11 [484]
1. Technology is something that makes things easier. 2. Technology help students in someway maybe find information about something the good thing about technology in students is that they can learn more things and the bad thing is that technology can be dangerous for students,
3 0
3 years ago
Which screen should be open to customize or personalize a desktop background?
stira [4]
Display Properties is the screen that should be open
5 0
4 years ago
Read 2 more answers
Are used to connect a computer to a telephone line for dial-up internet access
Stella [2.4K]
I mean it typically goes wall jack to filter to line...
5 0
4 years ago
Other questions:
  • How do networks help protect data? -by preventing access by more than one person at a time -by restricting access to department
    11·2 answers
  • 8.8 Lab: Swapping variables Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the
    15·1 answer
  • What is Livvyo? Livvyo review
    8·1 answer
  • Daniel owns a construction company that builds homes. To help his customers visualize the types of homes he can build for them,
    6·1 answer
  • I just wanna promote my 2 yt channels c: <br> (the channels are in the comments of this question)
    14·1 answer
  • Which computers were the first PCs with a GUI<br> MS-DOS <br> Linux<br> Windows<br> Mac
    7·2 answers
  • The letters G, H, T, Y, B, and N are what type of keys?
    15·2 answers
  • Please help me with these questions please
    15·1 answer
  • One of the difficult things about working in game design is that while there are many different roles, most of them only match o
    15·1 answer
  • I NEED HELP!! THIS IS 3D COMPUTER MODELING COURSE IN CONNEXUS
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!