Ask Question
4 June, 18:19

Consider the most important item among all the categories of information stored on your personal computer. As it applies to that item of information (your information asset), identify an example of a corresponding threat, threat agent, vulnerability, exposure, risk, attack, and exploit.

+1
Answers (1)
  1. 4 June, 20:39
    0
    - Loss or corrupted data - virus, weak password discovered by brute force attack, web security vulnerability like SQL injection, misconfigured software and phishing.

    Explanation:

    Threats in a computer system, are actions that are caused by malicious softwares, to corrupt or steal information by attackers. The threat agents in computer systems are virus, rootkit, Trojan horse etc.

    Vulnerability is a computer systems failure to mitigate weakness in the system like weak password to prevent unauthorised access.

    Attacks like phishing involves using the internet to steal user personal information, when a user accesses a fake website. Exploits includes using the vulnerable system service for the gain of the attackers.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question ✅ “Consider the most important item among all the categories of information stored on your personal computer. As it applies to that item of ...” in 📘 Computers and Technology if you're in doubt about the correctness of the answers or there's no answer, then try to use the smart search and find answers to the similar questions.
Search for Other Answers