1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
15

Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities

are operating system software, communications, malware, procedural, or application specific. Discuss if any of the selected threats are also meaningful to the Internet of Things (IoT).
Computers and Technology
1 answer:
kherson [118]3 years ago
7 0

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

You might be interested in
How does the Pareto principle apply to product development?.
Dominik [7]
The Pareto Principle, commonly referred to as the 80/20 rule, states that 80% of the effect comes from 20% of causes. Or, in terms of work and time management, 20% of your efforts will account for 80% of your results.
5 0
2 years ago
coding could help prevent car crashes with automatic driving cars; however, some are afraid of tha because it allows control ove
dybincka [34]

Answer:

Honestly self driving cars are the future of humans and it can and will help us evolve. It could possibly be more dangerous if someone messed up the coding and it can be hacked by almost anyone with coding abilities, so it all depends on how safe you think you will be not driving yourself anywhere. Overall it could go both ways( good or bad.)

Hope this helped

Explanation:

5 0
3 years ago
What do HIPAA guidelines protect?
Kruka [31]

Answer:

They protect patient medical records im pretty sure

Explanation:

7 0
2 years ago
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as for exam
Dvinal [7]

Answer:

Option B: DNS

Explanation:

Domain Name Server (DNS) is analogous to a phone book where people can look up a person name through numerical phone number. A DNS server is a database that host a database of public IP addresses (e.g. 64.233.160.0) and their associated hostname (e.g. google.com).

Whenever we type domain name in the address bar of our browser (e.g. google.com), that domain will be delivered to DNS server. Inside DNS server the URL will be mapped with its corresponding IP address making it possible for the web request to reach the the target server.

6 0
3 years ago
Find the error in the following code fragment. int a: System.out.print(a):​
trapecia [35]

Answer:

If your using java, then its supposed to be "System.out.print("a")"    

Explanation:

its supposed to have quotations

7 0
2 years ago
Other questions:
  • Capacity requirements are computed by multiplying the number of units scheduled for production at a work center by the:
    14·1 answer
  • Bayley wants to connect a new external hard drive to his Windows PC. He wants the fastest connection type available because he p
    9·2 answers
  • When installing a device driver, start the computer in
    6·1 answer
  • Create your own Python code examples that demonstrate each of the following. Do not copy examples from the book or any other sou
    11·1 answer
  • The method needed to arrange for an object to be notified when a window's close-window button has been clicked is
    6·1 answer
  • Based on the screenshot below which letter do you select to sort the items in an alphabetical order?
    9·1 answer
  • Picture related to cyber safety
    10·2 answers
  • Write a statement to declare a variable x with data type int and initialise with the value 10​
    13·1 answer
  • You are attempting to print a document from your workstation to the network printer in your office. The print job failed when yo
    14·1 answer
  • HELP 20 points THIS IS ON EDGE IF YOU DON'T KNOW THE ANSWER DON'T RESPOND
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!