What type of threats exists beyond Internet attacks?

What will be an ideal response?


Don't think only about Internet attacks here. Sure, hacker-style threats are real, but there are so many others. A threat can be a person sneaking into your offices and stealing passwords, or an ignorant employee deleting files they should not have access to in the first place. Natural disasters, like earthquakes, fires, floods, and crazed squirrels, are also threats.
 

Computer Science & Information Technology

You might also like to view...

The ___________________ statement is useful for displaying diagnostic messages that can assist with debugging a program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A ________ provides an easy-to-read format suitable for printing

A) wizard B) macro C) form D) report

Computer Science & Information Technology

The results of the risk analysis should be documented in a _________.

A. journal B. consequence C. risk register D. none of the above

Computer Science & Information Technology

Which best describes RFID technology?

A. a small electronic device that can track items at a distance B. an online transaction between a government agency and a business C. a special-purpose computer system incorporated into a piece of equipment D. a device that provides location information and directions

Computer Science & Information Technology