Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Arnel B.

Caminos

BS-Infotech 3B

1. What are the most common threat to information systems Devices and Technology, Why?

- IT systems and data are frequently exposed to hardware and software problems such as power outages
or data corruption. Malware is a sort of malicious software that is designed to disrupt the operation of a
computer. Viruses are computer programs that can replicate and spread from one computer to another,
disrupting computer operations.

2. What type of prevention can be implemented to reduce or stop security threats?

- The perimeter was traditionally the primary focus of threat prevention. With a growing range of
threats such as malware and ransomware arriving via email spam and phishing efforts, advanced
threat protection needs an integrated, tiered approach to security. Technologies for detecting and
preventing intrusions, better malware protection, and other endpoint security risks could be included.

3. Propose strategies on how to counterattack threats.

- When issuing a threat, put out a causal "if, then" sequence of events that ties the other party's
refusal to satisfy your demands to concrete repercussions. You improve the chances that the other
side will meet your expectations if you are specific in your demands.

You might also like