SlideShare a Scribd company logo
1 of 1
Download to read offline
Answers the Questions below. To be submitted through the class rep on 15/03/2023 1. According
to the 2010/11 CSI Computer Crime and Security Survey, which of the following was the most
common security incident? a. being fraudulently misrepresented as a sender of email messages
requesting personal information b. malware infection c. laptop or mobile hardware theft d.
employees, abuse of Internet access or email 2. Computer security incidents occur around the
world, with personal computer users in developing countries being exposed to the greatest risk of
their computers being infected by malware. True or False? 3. An attack on an information system
that takes advantage of a vulnerability is called a(n) 4. -software operates in a software layer that
runs on top of the operating system and enables multiple virtual machines each with their own
operating system to run on a single computer.

More Related Content

Similar to Answers the Questions below To be submitted through the cla.pdf

MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
varun4110
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
croysierkathey
 
computer security and its relationship to computer forensic
 computer security and its relationship to computer forensic computer security and its relationship to computer forensic
computer security and its relationship to computer forensic
Shabnamkhan113
 

Similar to Answers the Questions below To be submitted through the cla.pdf (20)

455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptx455845434-Chapter-2-Cyber-Security-pptx.pptx
455845434-Chapter-2-Cyber-Security-pptx.pptx
 
C018131821
C018131821C018131821
C018131821
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Computer and internet crime.pptx
Computer and internet crime.pptxComputer and internet crime.pptx
Computer and internet crime.pptx
 
computer security and its relationship to computer forensic
 computer security and its relationship to computer forensic computer security and its relationship to computer forensic
computer security and its relationship to computer forensic
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 

More from sandeep252523

Assume that the local newspaper just ran the following headl.pdf
Assume that the local newspaper just ran the following headl.pdfAssume that the local newspaper just ran the following headl.pdf
Assume that the local newspaper just ran the following headl.pdf
sandeep252523
 
Vaka almas Teknoloji Sears Kurtarabilir mi Sears Roebuc.pdf
Vaka almas Teknoloji Sears Kurtarabilir mi  Sears Roebuc.pdfVaka almas Teknoloji Sears Kurtarabilir mi  Sears Roebuc.pdf
Vaka almas Teknoloji Sears Kurtarabilir mi Sears Roebuc.pdf
sandeep252523
 
The arbiter of Example 72 controls access to a common resou.pdf
The arbiter of Example 72 controls access to a common resou.pdfThe arbiter of Example 72 controls access to a common resou.pdf
The arbiter of Example 72 controls access to a common resou.pdf
sandeep252523
 
Review the following case study and make an action plan for .pdf
Review the following case study and make an action plan for .pdfReview the following case study and make an action plan for .pdf
Review the following case study and make an action plan for .pdf
sandeep252523
 
Previously answered code did not work please make sure it ru.pdf
Previously answered code did not work please make sure it ru.pdfPreviously answered code did not work please make sure it ru.pdf
Previously answered code did not work please make sure it ru.pdf
sandeep252523
 

More from sandeep252523 (20)

A population of values has a normal distribution with 1309.pdf
A population of values has a normal distribution with 1309.pdfA population of values has a normal distribution with 1309.pdf
A population of values has a normal distribution with 1309.pdf
 
Assume that the local newspaper just ran the following headl.pdf
Assume that the local newspaper just ran the following headl.pdfAssume that the local newspaper just ran the following headl.pdf
Assume that the local newspaper just ran the following headl.pdf
 
Python It is common for images of a countrys previous leade.pdf
Python It is common for images of a countrys previous leade.pdfPython It is common for images of a countrys previous leade.pdf
Python It is common for images of a countrys previous leade.pdf
 
Bir firma iin ksa vadeli maliyet erilerinin tamam bize .pdf
Bir firma iin ksa vadeli maliyet erilerinin tamam bize  .pdfBir firma iin ksa vadeli maliyet erilerinin tamam bize  .pdf
Bir firma iin ksa vadeli maliyet erilerinin tamam bize .pdf
 
Question 2 Banking and the Federal Reserve Consider a bank .pdf
Question 2 Banking and the Federal Reserve Consider a bank .pdfQuestion 2 Banking and the Federal Reserve Consider a bank .pdf
Question 2 Banking and the Federal Reserve Consider a bank .pdf
 
3121 Periodically assess the security controls in organiza.pdf
3121 Periodically assess the security controls in organiza.pdf3121 Periodically assess the security controls in organiza.pdf
3121 Periodically assess the security controls in organiza.pdf
 
Vaka almas Teknoloji Sears Kurtarabilir mi Sears Roebuc.pdf
Vaka almas Teknoloji Sears Kurtarabilir mi  Sears Roebuc.pdfVaka almas Teknoloji Sears Kurtarabilir mi  Sears Roebuc.pdf
Vaka almas Teknoloji Sears Kurtarabilir mi Sears Roebuc.pdf
 
Given the data x1y1x2y2xnyn best fitting data .pdf
Given the data x1y1x2y2xnyn best fitting data .pdfGiven the data x1y1x2y2xnyn best fitting data .pdf
Given the data x1y1x2y2xnyn best fitting data .pdf
 
Match the investment concept to its definition diversificati.pdf
Match the investment concept to its definition diversificati.pdfMatch the investment concept to its definition diversificati.pdf
Match the investment concept to its definition diversificati.pdf
 
The figure below illustrates positive externalities of educa.pdf
The figure below illustrates positive externalities of educa.pdfThe figure below illustrates positive externalities of educa.pdf
The figure below illustrates positive externalities of educa.pdf
 
All of the following are risk factors that lead to endotheli.pdf
All of the following are risk factors that lead to endotheli.pdfAll of the following are risk factors that lead to endotheli.pdf
All of the following are risk factors that lead to endotheli.pdf
 
The arbiter of Example 72 controls access to a common resou.pdf
The arbiter of Example 72 controls access to a common resou.pdfThe arbiter of Example 72 controls access to a common resou.pdf
The arbiter of Example 72 controls access to a common resou.pdf
 
The following information is available for two samples selec.pdf
The following information is available for two samples selec.pdfThe following information is available for two samples selec.pdf
The following information is available for two samples selec.pdf
 
Review the following case study and make an action plan for .pdf
Review the following case study and make an action plan for .pdfReview the following case study and make an action plan for .pdf
Review the following case study and make an action plan for .pdf
 
Previously answered code did not work please make sure it ru.pdf
Previously answered code did not work please make sure it ru.pdfPreviously answered code did not work please make sure it ru.pdf
Previously answered code did not work please make sure it ru.pdf
 
Question 14 Time extensions are typically granted for avoida.pdf
Question 14 Time extensions are typically granted for avoida.pdfQuestion 14 Time extensions are typically granted for avoida.pdf
Question 14 Time extensions are typically granted for avoida.pdf
 
Please help with an SQL error The result tableset should l.pdf
Please help with an SQL error The result tableset should l.pdfPlease help with an SQL error The result tableset should l.pdf
Please help with an SQL error The result tableset should l.pdf
 
Question Need to have proper explanation for each and every.pdf
Question Need to have proper explanation for each and every.pdfQuestion Need to have proper explanation for each and every.pdf
Question Need to have proper explanation for each and every.pdf
 
Evaluate the impact of governments responses to the pandemi.pdf
Evaluate the impact of governments responses to the pandemi.pdfEvaluate the impact of governments responses to the pandemi.pdf
Evaluate the impact of governments responses to the pandemi.pdf
 
parts a through c below Cick the ison to view the tabie.pdf
parts a through c below Cick the ison to view the tabie.pdfparts a through c below Cick the ison to view the tabie.pdf
parts a through c below Cick the ison to view the tabie.pdf
 

Recently uploaded

Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
cupulin
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Recently uploaded (20)

male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 

Answers the Questions below To be submitted through the cla.pdf

  • 1. Answers the Questions below. To be submitted through the class rep on 15/03/2023 1. According to the 2010/11 CSI Computer Crime and Security Survey, which of the following was the most common security incident? a. being fraudulently misrepresented as a sender of email messages requesting personal information b. malware infection c. laptop or mobile hardware theft d. employees, abuse of Internet access or email 2. Computer security incidents occur around the world, with personal computer users in developing countries being exposed to the greatest risk of their computers being infected by malware. True or False? 3. An attack on an information system that takes advantage of a vulnerability is called a(n) 4. -software operates in a software layer that runs on top of the operating system and enables multiple virtual machines each with their own operating system to run on a single computer.