in Computer Networks edited by
1,499 views
0 votes
0 votes

Consider the scenarios.

1. A wifi connection without encryption.

2. Presence of malicious virus

3. Authentication with weak password.

In  network security paradigm given scenarios can be classified as:


(A). 1. Threat  2. Threat   3. Vulnearability

(B). 1. Vulnearability  2. Threat   3. Threat

(C). 1. Threat  2. Vulnearability   3. Vulnearability

(D). 1. Vulnearability  2. Threat   3. Vulnearability

in Computer Networks edited by
by
1.5k views

1 Answer

2 votes
2 votes
ans is d
by

1 comment

Correct!!

Threat: A threat is an indication of intent to cause disruption within an
information system. Some examples of threat agents are hackers, disgruntled employees, and malicious software (malware) such as viruses or spyware that can wreak havoc on a wireless network.



Vulnerability: A vulnerability is a weakness within an information system that can be exploited by a threat. Some examples are wireless networks not using encryption, weak passwords on wireless access
points or APs (which is the central hub for a set of wireless computers), and an AP sending wireless signals outside the building. 

0
0

Related questions