3WEEK 2 HOMEWORK: ASSESSING SECURITY CULTUREadvertisements and sends unwanted information from the smartphone. Many open-sourceand mobile phone commercial applications, operating systems, and middleware arecomplicated and extensive. In normal execution, these networks can change throughseveral states(Martins & Eloff, 2002). These features make it mainly hard to grow orfunction software that is reliably correct or safe.Accessing unsecured Wi-Fi: Intruders might be looking on open Wi-Fi spots such asairports and can see everything sent over the unencrypted networks to include the logininformation at passwords to applications and sites of the company(Okere, Van Niekerk,& Carroll, 2012). If the employees download or send important corporation files over theunsecured networks, anyone using that Wi-Fi can see the files and documents.DoS: Denial-of-Service (DoS) attacks are attacks are meant to shut down networks ormachines, making them unreachable to their intended consumers (Tolah, Furnell, &Papadaki, 2017). A DoS attack achieves this by sending the target information thattriggers crashes or flooding them with traffics. In both instances, the DoS attacks deprive