Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

need 1&2 Questions and Answers Baguio Central University CIS MISC

Beoordeling
-
Verkocht
-
Pagina's
5
Cijfer
A+
Geüpload op
07-02-2023
Geschreven in
2022/2023

1)Since we know that this particular instance of the AppMaker implements a customerfacing store that processes financial transactions, how does that influence which threat agents may be interested in attacking it? Nowadays, various security threats been reported all over the world. In this case of public internet traffic, in which the customer has to transact any product and involved the financial transaction, the threat agent can steal or scam the transaction in different ways. For example, he or she can steal the financial information of any customers from the app or website which is called "Denial of Service Attacks (DoS). This would happen if the App or the website obtained low security and obtained lots of vulnerability when it comes to their security protection towards customer's information and transactions. The higher the threat agent has persuaded the higher the harm and may lead individuals getting harmed or even to lethal, the lower the inspiration they get, the lesser will be to the harm caused. It is acknowledged by a few nations worldwide that there are extraordinary and numerous financial dangers and arrangements ought to be found to limit such dangers. The overall economy is harmed by such financial transactions and a ton of assets are utilized in the reason for attempting to discover the root and aim of dangers. Because of present-day registering requests on the planet needs to have another advancement of new strategies to adequate

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

1


1)Since we know that this particular instance of the AppMaker implements a customer-

facing store that processes financial transactions, how does that influence which threat

agents may be interested in attacking it?



Nowadays, various security threats been reported all over the world. In this case of public

internet traffic, in which the customer has to transact any product and involved the financial

transaction, the threat agent can steal or scam the transaction in different ways. For example, he

or she can steal the financial information of any customers from the app or website which is

called "Denial of Service Attacks (DoS). This would happen if the App or the website obtained

low security and obtained lots of vulnerability when it comes to their security protection towards

customer's information and transactions. The higher the threat agent has persuaded the higher the

harm and may lead individuals getting harmed or even to lethal, the lower the inspiration they

get, the lesser will be to the harm caused. It is acknowledged by a few nations worldwide that

there are extraordinary and numerous financial dangers and arrangements ought to be found to

limit such dangers. The overall economy is harmed by such financial transactions and a ton of

assets are utilized in the reason for attempting to discover the root and aim of dangers. Because

of present-day registering requests on the planet needs to have another advancement of new

strategies to adequately and precisely screen such a threat agent and their exercises (Li & Xue,

2011).

Understanding threat agents give a general outline of what and who the whole

conversation is clarifying. They are notable as specialists in a single manner or the other do

hacking to the association's information and they might be associations representative or other

organizations' workers with the enthusiasm of gaining admittance to the private information of




This study source was downloaded by 100000860007226 from CourseHero.com on 02-07-2023 01:22:39 GMT -06:00


https://www.coursehero.com/file/55353328/need-1amp2docx/

, 2


an association. They can be arranged into various kinds relying upon the aim of the specialist,

they can be of individual advantages, political intrigue, retribution objectives, psychological

oppressor interests or some other additions to the programmer. Because of the radical changes in

the data framework to human lives all around since for the most part, regular exercises rely upon

the PC foundation and it faces a lot of difficulties of dangers from various edges. The utilization

of App associated with web systems makes threat agents dynamic and simpler to get to or

perform a fraud on the financial transactions by the customers. Distinctive threat agents are

dynamic and are confirmed. The most drifting and dreaded threat agents that are dynamic in fear-

based oppressors around the world. Psychological warfare has become the most test confronting

pretty much every nation and its final product is destroying both the administration and the

residents.




2. Using Figure 5.4 as the target architecture, who are the threat agents who will be most

interested in attacking Web applications created through AppMaker?

Web applications are among the most predominant stages for the conveyance of

administrations and data over the net in the present day created through AppMaker. While they

are logically being used for significant administrations, web applications have come to be well

known and key focuses for security dangers and assaults. Even though there has been a wide

scope of strategies made for bracing web applications just as alleviating web applications

assaults, little endeavors have been committed to draw connections among such systems and

construct an incredible image of net application security study. Therefore, web application

vulnerabilities have been rising drastically. As of now, web applications are typically utilized in

conditions that a basic to security, for example, military frameworks, money related, medicinal


This study source was downloaded by 100000860007226 from CourseHero.com on 02-07-2023 01:22:39 GMT -06:00


https://www.coursehero.com/file/55353328/need-1amp2docx/

Geschreven voor

Vak

Documentinformatie

Geüpload op
7 februari 2023
Aantal pagina's
5
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$9.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
ExamsConnoisseur Self
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
587
Lid sinds
3 jaar
Aantal volgers
344
Documenten
1492
Laatst verkocht
3 weken geleden

4.2

68 beoordelingen

5
40
4
11
3
13
2
1
1
3

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen