1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marysya [2.9K]
3 years ago
15

Explain three specific & major security threats to internet users. In each case, address whether or not the vulnerabilities

are operating system software, communications, malware, procedural, or application specific. Discuss if any of the selected threats are also meaningful to the Internet of Things (IoT).
Computers and Technology
1 answer:
kherson [118]3 years ago
7 0

Answer:

See explaination

Explanation:

We already know that people all over the world are using the internet to communicate with each other to store their personal data, for the entrainment working in internet, doing online shopping and a lot of things. The user can faced with many threats. These threats are of different form.

The listed and explained below are some of the threats;

a) Compromised browser:-

Most popular browser are targeted and any security flaws exploited immediately. Criminals uses the flaws to gain access to sensitive document and shadow users browsing activity.

Phishing:-

Phishing is simply referring to the spam email or websites. Most times it is used to steal ones data, identity and funds. It looks genuine, this is what makes it hard to detect .

Poisoned websites:-

These are the fake link with hidden malware where the malware creator create a juicy news /video link which attract the user but the destination affect the PCs and the PC give a big virus alert and then compelled a visitor to be aware of the malware.

Misused social media sites:- These are often used in work place these are misused to spread Trojans and malware User download file and put the corporate network at risk .

These threats are not meaningful to the internet of Things (IOT) but there are different things like if you have a CCTV camera and it is connected to internet so by the threads anyone can take control over the cameras it can shut down the camera delete the recording of the camera and other things. There are the other threats.

You might be interested in
How would you create a tint of a color?
svetlana [45]
D. white with a hue
HOPE THIS HELPS
5 0
3 years ago
Having one password for all accounts is an easy way to remember passwords, but it will expose you to what risk?
Gwar [14]
<span>Having one password for all accounts is an easy way to remember passwords, but it will expose you to the risk of losing all of your accounts. If a person hacks one of your accounts, then they will have access to everything you own. </span>
3 0
3 years ago
why backupdocs.com keeps giving computer system update with regards to pdf documents savings? #backupdocuments
prohojiy [21]

The computer system update will ask a question to update pdf documents or not.

<u>Explanation</u>:

  • The computer system update will ask a question to update pdf documents or not.
  • Backupdocs.com is a website used to back up all the data contained in the computer system.
  • Generally, it will ask the user the questions to backup which data and which data should not be backed up.
  • So when we select the backup option it will ask the user to confirm backup or not including all the documents.
  • So backupdocs.com will be giving an update to the computer system regarding the pdf documents savings.

 

6 0
3 years ago
All information that is to be processed by a computer must first be entered into memory via an input device.
Goshia [24]
The answer is true, since it needs to be sent to the main server to be processed
3 0
2 years ago
In the Bullets and Numbering dialog box, the size of bullets and numbers is set in __________.
wlad13 [49]

The answer is C, percentage of text size.

5 0
4 years ago
Read 2 more answers
Other questions:
  • Achieving a degree in computer forensics, information technology, or even information systems can provide a strong foundation in
    11·1 answer
  • In the lab, you performed an asset identification and classification exercise by creating a(n) __________ organized within the s
    10·1 answer
  • 4. The clutch pedal is found in cars with manual and automatic transmissions.
    6·1 answer
  • The desktops of computers running the same OS all look the same
    8·1 answer
  • Int a=10 int b=20<br> A=b<br> The new values for a and b are
    11·2 answers
  • Describe what each of the following functions in R do.1. t2. matplot3. c4. seq5. legend6. matrix7. rownames8. colnames9. type of
    14·1 answer
  • The first form of the rocket is believed have been developed in _?
    14·2 answers
  • 1. (01.03 MC) What is a string in Python
    9·2 answers
  • When there is a missing DLL file, _______.
    5·2 answers
  • Which testing is used for a program's individual components functionality testing?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!