Computer Science, asked by munishsharma7700, 7 months ago

. Possible threat to any information cannot be

Answers

Answered by bvsn1940
0

Answer:

Ingnored

Explanation: When there lies a threat to any system, safeguards can be implemented, outsourced, distributed or transferred to some other system, protected using security tools and techniques but cannot be ignored.

please mark me as Brainlist

Answered by monica789412
0

Possible threats to any information cannot be ignored as a piece of information is a delicate and can be misused in innumerous ways.

How it is protected?

  • The information can be protected using highly effective security techniques, when there lies any threat to the information.
  • Just for securing  the information safely when there lies strict threatening remarks to the system, safeguards can be distributed, outsourced, transferred, implemented,  to some other system.
  • Worms, trojans, viruses,  and spam are some threats but information security threats include  spyware, privilege escalation, adware,  botnets, logic bombs,  and rootkits.
Similar questions