1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UkoKoshka [18]
3 years ago
6

Since we know that this particular instance of the AppMaker implements a customer-facing store that processes financial transact

ions, how does that influence which threat agents may be interested in attacking it?
Computers and Technology
1 answer:
malfutka [58]3 years ago
4 0

Answer:

The threats agents may  be interested in attacking includes  

  • Dos ( denial of service ) Attacks.
  • Blackmailing end-users for information.
  • Attacker can buy products for no price ( zero price )
  • The threat of raising prices of products with fake value
  • Theft of the products at return
  • The threat of  the miss use of personal details of customers.

Explanation:

Since the Appmaker implements a customer-facing store that processes financial transactions

The threats agents may  be interested in attacking includes  

  • Dos ( denial of service ) Attacks.
  • Blackmailing end-users for information.
  • Attacker can buy products for no price ( zero price )
  • The threat of raising prices of products with fake value
  • Theft of the products at return
  • The threat of  the miss use of personal details of customers.
You might be interested in
My mom hid my laptop and now I can't find it​
Svetach [21]

Answer: did you look everywhere ask for it and be like mom i wont do (whatever you did) ever again so please give me a chance can i plsss!!!!!! have it back?

Explanation:

simple as that step by step

3 0
3 years ago
What is the value of the variable result after these lines of code are executed?
Marta_Voda [28]

Answer:

W

Explanation:

W

3 0
3 years ago
Read 2 more answers
HELP ASAP- YOU GET BRAINLIEST!!
agasfer [191]

Answer:

BLOb

Explanation:

Binary Large Objects (BLOb) data is capable of storing data in the form of images, audio, and video clips.

3 0
4 years ago
A computer needs both hardware and to be useful
riadik2000 [5.3K]

Answer:

Software? or a person?

5 0
3 years ago
Read 2 more answers
What is your favorite LEGO set
alekssr [168]

Answer:

star wars death star....

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which payment type is best if you are trying to sick to a budget?
    15·1 answer
  • Which of the following statements is true?
    10·1 answer
  • Which pane displays commands that change relative to the activity taking place in the presentation window's main work area?
    11·2 answers
  • What term identifies a blank screen or animation that automatically displays on a computer monitor after a specified period of i
    9·1 answer
  • To share a document in my online electronic journal, I should select the option to _____.
    14·1 answer
  • A powerful computer that acts as a hub for other computers is a called a ______.
    15·2 answers
  • How do you make Thumbnails and outros on Youtube for free?
    8·1 answer
  • Your company leases a very fast internet connection and pays for it based on usage. You have been asked by the company president
    8·1 answer
  • Which of the following film pioneers helped make films widely available to ordinary people?
    8·2 answers
  • For her presentation on Italy, Matilda used a red background with light green text. When her friend critiqued her presentation,
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!