answersLogoWhite

0


Best Answer

intent

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the difference between Intentional Man made Threats to your computer and Unintentional Man made Threats?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Is are a collection of various intentional threats and unintentional contamination hazards?

___________ is (are) a collection of various intentional threats and unintentional contamination hazards


What is a collection of various threats and intentional threats and unintentional contamination hazards?

hazards


What a collection of various intentional threats and unintentional contamination hazards?

hazards


What are a collection of various intentional threats and unintentional contamination hazards?

hazards


What is collection of various intentional threats and unintentional contamination hazards?

hazards


What is (are) a collection of various intentional threats and unintentional contamination hazards?

hazards


A collection of various intentional threats and unintentional contamination hazards?

All hazards


Is a collection of various intentional threats and unintentional contamination hazards?

All hazards


What is the difference between hazards and threats?

Hazards are potential sources of harm or danger, such as natural disasters or chemical spills, while threats are deliberate or intentional actions that could cause harm, like cyber attacks or terrorism. Hazards are typically more passive and occur due to natural or environmental factors, whereas threats involve human intent to cause harm.


How do you secure computer from computer threats?

By using Antivirus


Information assurance represents an internal human threat?

While employees can pose a threat to information security through intentional or unintentional actions, information assurance focuses on ensuring the confidentiality, integrity, and availability of data and information systems. It involves implementing security measures, policies, and protocols to protect against both internal and external threats to an organization's information assets.


What are the typical threats a computer user can encounter when using the computer?

Common threats to computers nowadays include: * Malware (Viruses, Worms, Trojan Horses) * Hackers * Spam * Phishing