100%(24)24 out of 24 people found this document helpful
This preview shows page 1 - 3 out of 6 pages.
1.Distinguish between vulnerability, threat, and control?Vulnerability:Vulnerability is a weakness in the security system, for example in procedures,design or implementation that might be exploited to cause loss or harm. For instance a particularsystem may be vulnerable to unauthorized data manipulation because the system does not verifya users identity before allowing data access.Threat: A threat to a computing system is a set of circumstances that has the potential to causeloss or harm. To see the difference between a threat and vulnerability, consider the illustration.There are many threats to a computer system, including human initiated and computer-initiatedones.Control: We use a control as a protective measure.That is a control is an action, device,procedure, or technique that removes or reduces vulnerability, threat is blocked by control ofvulnerability.2.Theft usually results in some kind of harm. For example, if someone steals your car, youmay suffer financial loss, inconvenience (by losing your mode of transportation), andemotional upset (because of invasion of your personal property and space). List threekinds of harm a company might experience from theft of computer equipment.When company has experience theft of computer equipment Loss of business, loss ofinformation stored in computer, reputation of company or the shares decreases3.List at least three kinds of harm a company could experience from electronic espionageor unauthorized viewing of confidential company materials.loss of competitive edge, loss of trade secrets, public embarrassment or harm to reputation, legalliability for failing to uphold confidentiality agreements with third parties. 4.List at least three kinds of damage a company could suffer when the integrity of aprogram or company data is compromised.Loss of confidentiality, companies old history stored in computers may be lost, loss in shares.5.List at least three kinds of harm a company could encounter from loss of service, that is,failure of availability. List the product or capability to which access is lost, and explain how thisloss hurts the company.The three kinds of harms a company encounter is virus, fraud achieved by manipulating records,intellectual property theft.Availability is also lost by internet service or router6.Describe a situation in which you have experienced harm because of a failure ofcomputer security. Was the failure malicious or not? Did the attack target you specificallyor was it general and you were the unfortunate victim?
Many people face this problem all the time. When we start browsing something, we receivelot of advertisements. When does effect some people and does not affect some. This type oftarget are not specifically done they are usually done with everyone.