The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 2 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Described below are seven scenarios that are examples of the following things: Threat, Threat agent, Vulnerability, Exposure, Risk, Attack, Exploit.
Read the description of each scenario in the left column, and then write into the right column which type of scenario it is. There may, or may not be, more than one type of scenario.
1. A specific attacker could compromise my system.
2. My firewall logs approximately 50 attempts each day at gaining unauthorized access. This means that when my firewall is down while I am connected to the Internet, the probability of a successful unauthorized access is 83.3%
3. I turned off my firewall last night in order to run a specific software application.
4. There are hundreds of people/machines that attempt to breach my security and gain access to my system via my Internet connection.
5. I run Windows XP on my PC with file sharing enabled. If I leave thwwwwe PC connected to an always-on connection without a firewall control, it can be accessed by anyone who connects to it.
6. My machine was utilized for “IP hopping,” allowing hackers to use my system to connect to other systems.
7. My house was once struck by lightning and my PC’s motherboard and modem were destroyed.