100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
need 1&2 Questions and Answers Baguio Central University CIS MISC $9.49   Add to cart

Exam (elaborations)

need 1&2 Questions and Answers Baguio Central University CIS MISC

 3 views  0 purchase
  • Course
  • Institution

1)Since we know that this particular instance of the AppMaker implements a customerfacing store that processes financial transactions, how does that influence which threat agents may be interested in attacking it? Nowadays, various security threats been reported all over the world. In this case o...

[Show more]

Preview 2 out of 5  pages

  • February 7, 2023
  • 5
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
avatar-seller
1


1)Since we know that this particular instance of the AppMaker implements a customer-

facing store that processes financial transactions, how does that influence which threat

agents may be interested in attacking it?



Nowadays, various security threats been reported all over the world. In this case of public

internet traffic, in which the customer has to transact any product and involved the financial

transaction, the threat agent can steal or scam the transaction in different ways. For example, he

or she can steal the financial information of any customers from the app or website which is

called "Denial of Service Attacks (DoS). This would happen if the App or the website obtained

low security and obtained lots of vulnerability when it comes to their security protection towards

customer's information and transactions. The higher the threat agent has persuaded the higher the

harm and may lead individuals getting harmed or even to lethal, the lower the inspiration they

get, the lesser will be to the harm caused. It is acknowledged by a few nations worldwide that

there are extraordinary and numerous financial dangers and arrangements ought to be found to

limit such dangers. The overall economy is harmed by such financial transactions and a ton of

assets are utilized in the reason for attempting to discover the root and aim of dangers. Because

of present-day registering requests on the planet needs to have another advancement of new

strategies to adequately and precisely screen such a threat agent and their exercises (Li & Xue,

2011).

Understanding threat agents give a general outline of what and who the whole

conversation is clarifying. They are notable as specialists in a single manner or the other do

hacking to the association's information and they might be associations representative or other

organizations' workers with the enthusiasm of gaining admittance to the private information of




This study source was downloaded by 100000860007226 from CourseHero.com on 02-07-2023 01:22:39 GMT -06:00


https://www.coursehero.com/file/55353328/need-1amp2docx/

, 2


an association. They can be arranged into various kinds relying upon the aim of the specialist,

they can be of individual advantages, political intrigue, retribution objectives, psychological

oppressor interests or some other additions to the programmer. Because of the radical changes in

the data framework to human lives all around since for the most part, regular exercises rely upon

the PC foundation and it faces a lot of difficulties of dangers from various edges. The utilization

of App associated with web systems makes threat agents dynamic and simpler to get to or

perform a fraud on the financial transactions by the customers. Distinctive threat agents are

dynamic and are confirmed. The most drifting and dreaded threat agents that are dynamic in fear-

based oppressors around the world. Psychological warfare has become the most test confronting

pretty much every nation and its final product is destroying both the administration and the

residents.




2. Using Figure 5.4 as the target architecture, who are the threat agents who will be most

interested in attacking Web applications created through AppMaker?

Web applications are among the most predominant stages for the conveyance of

administrations and data over the net in the present day created through AppMaker. While they

are logically being used for significant administrations, web applications have come to be well

known and key focuses for security dangers and assaults. Even though there has been a wide

scope of strategies made for bracing web applications just as alleviating web applications

assaults, little endeavors have been committed to draw connections among such systems and

construct an incredible image of net application security study. Therefore, web application

vulnerabilities have been rising drastically. As of now, web applications are typically utilized in

conditions that a basic to security, for example, military frameworks, money related, medicinal


This study source was downloaded by 100000860007226 from CourseHero.com on 02-07-2023 01:22:39 GMT -06:00


https://www.coursehero.com/file/55353328/need-1amp2docx/

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ExamsConnoisseur. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

62890 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling

Recently viewed by you


$9.49
  • (0)
  Add to cart