A threat agent is a specific person/entity that is a likely hazard to a system or that can administer a threat. For example: A particular successful hacker or a Melissa virus. On the other hand, a threat is a category of things that might be a potential danger to the system. For example: Viruses, hackers, worms and other malwares. Threat agent is a specific person or thing that conducts the action that is a threat to the system.
5. What are the three components of the C.I.A triangle? What are they used for?
The three components of the C.I.A triangle are confidentiality, integrity and availability. These components are major necessities in order to remain safe from events such …show more content…
Example: A bank transaction made of $200 should not be changed as $240.
Availability is a major component because the authorized users need to access the information whenever required. Example: Information should be available to the users even when they face power outages.
8. Identify the six components of an information system. Which are most directly affected by the study of computer security? Which are most commonly associated with its study?
The six components of an information system are software, hardware, data, people, procedures, and networks. Data, hardware and software are most directly affected by the study of computer science as data is the most critical of all and almost all errors, and system breakdown is caused by the interaction of specific hardware and software. People are most commonly associated with its study since computer security starts from and ends with people that use the system intentionally or in other ways. However, in order to protect all our important data or to make it secure, we need to get acquainted to all six components as they are all interrelated parts of an integrated