Discuss the potential threat of cyber attack and security framework to prevent it
Answers
Explanation:
Computer Viruses: Computer Viruses contaminate multiple systems in the networks they infect. They are a threat to national security as they infiltrate domestic resources.
Copyright Infringement: Copyright is a type of intellectual property right. It is used to secure original works. They are protected by the Copyright Law. Copyright infringement is the use of these protected works without permission.
Monetary Cheats: Monetary cheats that happen online threaten to destabilize the economy of a nation as it incurs enormous losses.

Money exchange framework: Cybersecurity threats attack the money exchange framework through unauthorized transactions and illegal networks.
Extortion: Extortion is the practice of demanding money or property from an individual or enterprise utilizing force or threat. Naturally, this is one of the significant cybersecurity threats to ordinary civilians and businesses.
Obtaining Credit Card information: Criminals use hacking, phishing and several other techniques to collect credit card information such as names, email ids and in worst cases the card numbers.
Burglary of property: This involves threats and destruction of property.
Invasion of privacy: Invasion of privacy includes invasion of a person’s private information or publicizing the same information. It also provides defamation of a person.
Inappropriate Information: Internet users come across confronting content while browsing that may be unsuitable for them. This is also a threat to cybersecurity.
How to Prevent Cyber Security Threats

How individuals can safeguard themselves from cyber attacks:
Keeping your PC current with the most recent fixes and updates
Ensure your PC is designed safely and well configured with new patches
Pick robust passwords which are complex and not easily accessible or hackable
Ensure your PC with security programming like antivirus
Ensure your data is your own and is not manipulated
Online offers that look unbelievable are unbelievable
Survey your bank and financial records frequently
Look into identity protection services at Crediful
How businesses can safeguard themselves from cyber attacks:
Regularly backing up the data
Understanding the evolving risk
Developing a security policy
Looking out for red flags
Changing passwords frequently
Controlling the paper trail
PLEASE PLEASE PLEASE PLEASE PLEASE PLEASE PLEASE
HEARTY REQUEST TO YOU
PLEASE MARK ME BRAINLIEST.
PLEASE MARK ME BRAINLIEST
YOUR ONE BRAINLIEST CAN BE A GREAT CONTRIBUTION FOR ME.
DON'T FORGET TO FOLLOW .
Answer:
IS IT RELATED TO PHYSICS
Explanation: