1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
15

Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities

are operating system software, communications, malware, procedural, or application specific. Discuss if any of the selected threats are also meaningful to the Internet of Things (IoT).
Computers and Technology
1 answer:
kherson [118]3 years ago
7 0

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

You might be interested in
Which are elements involved in modeling a solution? Choose all that apply. A) often includes a visual graphic B) shows the flow
Diano4ka-milaya [45]
Need to know how to read Circuit diagramed
6 0
3 years ago
Read 2 more answers
Which statement is FALSE? If a method does not return a value, the return-value-type in the method declaration can be omitted. P
Tcecarenko [31]

Answer:

If a method does not return a value, the return-value-type in the method declaration can be omitted.

Explanation:

If a method does not return a value, the return-value-type in the method declaration can be omitted is a false statement.

8 0
3 years ago
Which statement best describes the role of computing in entrepreneurship? Entrepreneurs can only be successful with modern compu
kykrilka [37]
Well according to e2020 the answer would be A. "Entrepreneurs can only be successful with modern computing technology."
5 0
3 years ago
Implement a class Rectangle. Provide a constructor to construct a rectangle with a given width and height, member functions get_
Luba_88 [7]

Answer:

Explanation:

The following code is written in Java. It creates the Rectangle class with the height and width variables. The constructor takes these variables as parameters to create Rectangle objects. It creates the get_perimeter method that sums up two of each side in order to get the perimeter of the Rectangle. A get_area method multiplies the height by the width to get the area. Finally, a resize method takes in a double factor variable and multiplies the height and the width by the factor to get a resized Rectangle object.

class Rectangle {

   double height, width;

   public Rectangle(double height, double width) {

       this.height = height;

       this.width = width;

   }

   

   public double get_perimeter() {

       return (this.height + this.height + this.width + this.width);

   }

   

   public double get_area() {

       return (this.height * this.width);

   }

   

   public void resize(double factor) {

       this.height *= factor;

       this.width *= factor;

   }

}

3 0
3 years ago
1. compression
kykrilka [37]
What do you want me to do theres no question 
6 0
3 years ago
Other questions:
  • How can i change ip address <br>​
    7·1 answer
  • Which of the following matching is true concerning the Protocol Data Unit (PDU) and its corresponding OSI layer location?
    15·1 answer
  • describe a situation in which peer pressure could cause a serious problem for safe driving, and how you could resist the peer pr
    8·2 answers
  • Which of these characteristics is most important to a systems analyst? (1 point) (Points : 1.5) communicator
    15·1 answer
  • It’s been six months since the disk crash at CSM Tech Publishing, and the owner is breathing a little easier because you install
    7·1 answer
  • Excel spread sheets are primarily used to
    13·2 answers
  • Which of these personal protective equipment items prevents injury from falling objects ?
    15·1 answer
  • If a user has two texts selected, the Reveal Formatting pane allows the user to
    10·2 answers
  • When you install the ipam server feature you will be prompted to install which other features? (choose all that apply.)
    11·1 answer
  • Do you think that the TV set has outlived its utility as a household appliance? Research how convergence with internet technolog
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!