Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

need 1&2 Questions and Answers Baguio Central University CIS MISC

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
07-02-2023
Written in
2022/2023

1)Since we know that this particular instance of the AppMaker implements a customerfacing store that processes financial transactions, how does that influence which threat agents may be interested in attacking it? Nowadays, various security threats been reported all over the world. In this case of public internet traffic, in which the customer has to transact any product and involved the financial transaction, the threat agent can steal or scam the transaction in different ways. For example, he or she can steal the financial information of any customers from the app or website which is called "Denial of Service Attacks (DoS). This would happen if the App or the website obtained low security and obtained lots of vulnerability when it comes to their security protection towards customer's information and transactions. The higher the threat agent has persuaded the higher the harm and may lead individuals getting harmed or even to lethal, the lower the inspiration they get, the lesser will be to the harm caused. It is acknowledged by a few nations worldwide that there are extraordinary and numerous financial dangers and arrangements ought to be found to limit such dangers. The overall economy is harmed by such financial transactions and a ton of assets are utilized in the reason for attempting to discover the root and aim of dangers. Because of present-day registering requests on the planet needs to have another advancement of new strategies to adequate

Show more Read less
Institution
Course

Content preview

1


1)Since we know that this particular instance of the AppMaker implements a customer-

facing store that processes financial transactions, how does that influence which threat

agents may be interested in attacking it?



Nowadays, various security threats been reported all over the world. In this case of public

internet traffic, in which the customer has to transact any product and involved the financial

transaction, the threat agent can steal or scam the transaction in different ways. For example, he

or she can steal the financial information of any customers from the app or website which is

called "Denial of Service Attacks (DoS). This would happen if the App or the website obtained

low security and obtained lots of vulnerability when it comes to their security protection towards

customer's information and transactions. The higher the threat agent has persuaded the higher the

harm and may lead individuals getting harmed or even to lethal, the lower the inspiration they

get, the lesser will be to the harm caused. It is acknowledged by a few nations worldwide that

there are extraordinary and numerous financial dangers and arrangements ought to be found to

limit such dangers. The overall economy is harmed by such financial transactions and a ton of

assets are utilized in the reason for attempting to discover the root and aim of dangers. Because

of present-day registering requests on the planet needs to have another advancement of new

strategies to adequately and precisely screen such a threat agent and their exercises (Li & Xue,

2011).

Understanding threat agents give a general outline of what and who the whole

conversation is clarifying. They are notable as specialists in a single manner or the other do

hacking to the association's information and they might be associations representative or other

organizations' workers with the enthusiasm of gaining admittance to the private information of




This study source was downloaded by 100000860007226 from CourseHero.com on 02-07-2023 01:22:39 GMT -06:00


https://www.coursehero.com/file/55353328/need-1amp2docx/

, 2


an association. They can be arranged into various kinds relying upon the aim of the specialist,

they can be of individual advantages, political intrigue, retribution objectives, psychological

oppressor interests or some other additions to the programmer. Because of the radical changes in

the data framework to human lives all around since for the most part, regular exercises rely upon

the PC foundation and it faces a lot of difficulties of dangers from various edges. The utilization

of App associated with web systems makes threat agents dynamic and simpler to get to or

perform a fraud on the financial transactions by the customers. Distinctive threat agents are

dynamic and are confirmed. The most drifting and dreaded threat agents that are dynamic in fear-

based oppressors around the world. Psychological warfare has become the most test confronting

pretty much every nation and its final product is destroying both the administration and the

residents.




2. Using Figure 5.4 as the target architecture, who are the threat agents who will be most

interested in attacking Web applications created through AppMaker?

Web applications are among the most predominant stages for the conveyance of

administrations and data over the net in the present day created through AppMaker. While they

are logically being used for significant administrations, web applications have come to be well

known and key focuses for security dangers and assaults. Even though there has been a wide

scope of strategies made for bracing web applications just as alleviating web applications

assaults, little endeavors have been committed to draw connections among such systems and

construct an incredible image of net application security study. Therefore, web application

vulnerabilities have been rising drastically. As of now, web applications are typically utilized in

conditions that a basic to security, for example, military frameworks, money related, medicinal


This study source was downloaded by 100000860007226 from CourseHero.com on 02-07-2023 01:22:39 GMT -06:00


https://www.coursehero.com/file/55353328/need-1amp2docx/

Written for

Course

Document information

Uploaded on
February 7, 2023
Number of pages
5
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ExamsConnoisseur Self
Follow You need to be logged in order to follow users or courses
Sold
587
Member since
3 year
Number of followers
344
Documents
1492
Last sold
3 weeks ago

4.2

68 reviews

5
40
4
11
3
13
2
1
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions