answersLogoWhite

0


Best Answer

Making the system available
Making the system available
Making the system available
a. Destroying it

b. Adversely modifying data

c. Making the system available

d. Disclosing the information stored on the system
In regards to a computer, a threat is defined as any circumstance or even that can potentially harm an information system by doing everything except making the system available. This means that the computer is threatened and whatever is causing the threat is capable of harming the computer in some way (viruses, etc.).
Making the system available.

User Avatar

Wiki User

8y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: A threat is defined as any circumstance or event that can potentially harm an information system by all the following except?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

A threat to defined as any circumstance or event that can potentially harm and information system by all the following?

making the system available


An adversary's capability is defined as his ability to do which of the following?

Acquire and exploit critical information


Which of the following is best defined as the transfer of genetic information from one population to another?

Gene flow.


How do threats differ from attacks?

Threats are potentials for attacks. A threat is defined as a capability, intention, and/or attack method of an adversary to exploit, or any circumstance or event with the potential to cause harm to, information or an information system. It is also any circumstance or event with the potential to harm an information system (IS) through unauthorized access, destruction, disclosure, modification of data, and/or denial of service.Threats can include the potential for an earthquake or a fire as well as the potential for an attack by an individual or organization.


How is a threat defined in army information assurance?

Any circumstance or event with the potential to impact an information system (IS) adversely through unauthorized access, destruction, disclosure, modification, or of data and/or denial of service. information system (IS) adversely through unauthorized access, destruction,disclosure, modification, or of data and/or denial of service


What are the national sports of Australia?

In order it goes cricket, rugby, snowboarding, then soccer, but its not defined by circumstance. It depends on polls of the fans.


What element is defined by the following information p plus equals 11 n equals 12 e- equals 11?

Sodium (Na)


What is defined as a group of potentially breeding organisms within a species in a given space and time?

Populations


How was organized crime defined by US?

Crimes in the U.nited States are defined in the following bodies of law: ?


How can communication be defined?

communication can be defined as the process in which information is exchanged and understood by two or more people or communication can be defined as the transfer of understandable information from one person to another.


Which of the following is concerned with the promotion of Welfare State?

Social policy is concerned with the promotion of Welfare State. This involves the development and implementation of policies and programs aimed at improving the well-being and quality of life of all citizens through social protection, health care, education, and social services.


What is Critical information is defined as?

Important