Answer:
Explanation:
Your profile. Most social networks allow users to create detailed online profiles and connect with other users in some way. This may involve users sharing information with other users, such as one’s gender, age, familial information, interests, educational background and employment.
Your status. Most social networks also allow users to post status updates in order to communicate with other users quickly. Though there may be privacy settings to restrict access to status updates, these networks are frequently designed to broadcast information quickly and publicly.
Your location. Many social networks are designed to broadcast your real-time location, either as public information or as an update viewable to authorized contacts. This might allow users to “check in” to a local event or business, or share one’s location with contacts within their network.
Shared content. Many social networks encourage users to share content, such as music, photographs, videos and links to other webpages.
Answer:
i aint looking at random pictures bro, i dont know what might be on them
Explanation: ok
Answer:
Option B i.e., False.
Explanation:
The weakness, KRACK tricks a wifi access points to reuse an in-use encryption, enabling the intruder to decode and interpret data intended to remain encrypted. Wireless communication encrypts, that decrypt unencrypted wireless network activity and expose sensitive data.
So, the following scenario is false about the wireless attack.
Answer:No service from hospital for injured people
Explanation:
Yes of course
Answer:
SSH, HTTPS and SMTP
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
Hence, SSH, HTTPS and SMTP are considered as secure network protocols.
HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).
SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.