1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
15

Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities

are operating system software, communications, malware, procedural, or application specific. Discuss if any of the selected threats are also meaningful to the Internet of Things (IoT).
Computers and Technology
1 answer:
kherson [118]3 years ago
7 0

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

You might be interested in
As a student you are able to earn extra money by assisting your neighbors
Lorico [155]
You can just earn extra money by doing your neibors lawn
8 0
3 years ago
Read 2 more answers
What are the different components of the cloud architecture?
sashaice [31]

Cloud computing architecture can be described as components and subcomponents required for cloud computing. Typically, these components consist of front (fat client, mobile device, thin client) and black end platforms (storage, servers), a cloud based delivery, and a network (Internet, Internet, Cloud). When all of these components are combined, they make up a cloud architecture.

3 0
3 years ago
In animation what is exaggerated to make the characters more intensely what they are​
aleksklad [387]

Answer:

Exaggerated used of the technique can produce a comical effect, while more realistic animation must time the actions exactly to produce a convincing result. Slow in and slow out. Adds more frames near the beginning and near the end of a movement, and fewer in the middle, to make the animation appear more realistic.

5 0
4 years ago
Please tell fast plzzzzzzz​
padilas [110]

Answer:

True

Explanation:

I just check on my computer

5 0
3 years ago
Read 2 more answers
It is the student’s responsibility to meet the expectations identified by a rubric.
Alja [10]

Answer:

True

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • What wired channel, commonly used for cable tv, consists of an insulated copper wire wrapped in a solid or braided shield placed
    12·1 answer
  • The assignment of numeric codes to characters follows a specific order called a(n) _____.
    15·1 answer
  • Does the Main Content (MC) of a web page include searchboxes?
    10·1 answer
  • Web browsers are used to browse the world wide web.
    5·2 answers
  • Explain why decomposition will be used in creating the algorithm for the game including two dice.
    11·1 answer
  • Hooollaaaa , todos absolutamente todos quieren borrar esta tarea por que no tiene nada que ver con la materias del colegiooo per
    7·2 answers
  • When installing a Windows 10 an already installed Windows 7 what happen​
    11·2 answers
  • How many people did you help today
    11·2 answers
  • What is the half of 3/18
    6·1 answer
  • The area of ai that investigates methods of facilitating communication between computers and people is?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!