1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
15

Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities

are operating system software, communications, malware, procedural, or application specific. Discuss if any of the selected threats are also meaningful to the Internet of Things (IoT).
Computers and Technology
1 answer:
kherson [118]3 years ago
7 0

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

You might be interested in
An information system report is an example of...
STatiana [176]

Answer:

a. data processing

b. data collection

c. data input

d. data output

Explanation:

An information system is a system used to filter, process, collect, distribute and create data.

Information system can be a work system whereby humans and machine perform processess using informations gathered, process it to solve the needs of their customers in the form of goods and services.

8 0
4 years ago
Do debit cards allow you to draw funds directly from your checking accounts
LekaFEV [45]
Some of them do let you draw funds but not all debit cards
4 0
3 years ago
Why is the cpu the most important component in a computer?
german
CPU (Central Processing Unit) is also known as the brain of the computer because this is the place which actually runs the programs. The programs are the set of instructions needed to perform a task.
4 0
3 years ago
C programming Write a function named CalculateSphereVolume that takes one integer parameter intDiameter. The function should cal
FinnZ [79.3K]

Answer:

not familiar with C++. but basically save the constant 4/3 in a variable and use user input of cin << i  believe to ask for a radius. Then take that radius/input saved in a variable and cube it, then return the value.

Explanation:

i hope this works.

3 0
3 years ago
Which part of a computer s ip address configuration indicates the portion of the address that specifies the network address?
vivado [14]
The NETWORK mask is and'ed with the IP address to get the network number.

Example:

192.168.1.1 & 255.255.255.0 = 192.168.1.0/24

It's worth the effort to do this in binary, it makes much more sense.
4 0
3 years ago
Other questions:
  • How many times is "Alert" displayed in the following loop? for (int k =0; k&lt;= 100; k++) cout &lt;&lt; "Alert"; O 101 0 1 oo О
    7·1 answer
  • In a token ring system, how quickly is the token passed around the circuit? 50 times per second millions of times per second hun
    11·1 answer
  • Submit your 300-word essay describing the equipment usedI in a well-equipped studio’s audio department and the training and expe
    8·2 answers
  • RDBMS stands for_________________
    12·1 answer
  • You have no control over who views your social network information
    13·2 answers
  • Which part of the computer stores and processes data?
    14·1 answer
  • I have a question. This question will probably be deleted, but why do moderators keep deleting my answers when they are legitima
    13·1 answer
  • When memory allocation is ____, it means all portions of the program and OS are loaded into sequential locations in memory.
    15·1 answer
  • Hey does anyone know how to fix a computer that goes on and off. It is a Asus chromebook and putting it into recovery mode didn'
    5·2 answers
  • Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!