Poor Quality of Password and Unsafe Data Transmission

Information System Risks

Prev Question Next Question

Question

You are using Information system.

You have chosen a poor password and also sometimes transmits data over unprotected communication lines.

What is this poor quality of password and unsafe transmission referring to?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

Vulnerabilities represent characteristics of information resources that may be exploited by a threat.

The given scenario describes such a situation, hence it is a vulnerability.

Incorrect Answers: A: Probabilities represent the likelihood of the occurrence of a threat, and this scenario does not describe a probability.

B: Threats are circumstances or events with the potential to cause harm to information resources.

This scenario does not describe a threat.

D: Impacts represent the outcome or result of a threat exploiting a vulnerability.

The stem does not describe an impact.

The poor quality of the password and the unsafe transmission of data over unprotected communication lines are examples of vulnerabilities in an information system.

A vulnerability is a weakness or flaw in the system's design, implementation, or operation that can be exploited by an attacker to compromise the confidentiality, integrity, or availability of the information.

In this case, using a poor quality password, such as a simple or easily guessable one, is a vulnerability because it makes it easier for an attacker to gain unauthorized access to the system. Transferring data over unprotected communication lines, such as an unencrypted connection, is also a vulnerability because it can allow an attacker to intercept and read the data.

Threats, on the other hand, refer to potential events or circumstances that could harm the system or the information it stores. Threats can exploit vulnerabilities to cause harm. In this case, an attacker could be a threat if they try to exploit the vulnerabilities of the system.

Impacts refer to the consequences or outcomes of a successful attack on the system. In this case, if an attacker successfully exploits the vulnerabilities in the system, the impact could be data theft, data loss, or unauthorized access to the system.

Probabilities, in the context of information security, refer to the likelihood of a particular event or circumstance occurring. Probabilities can be used to assess the risk associated with a particular vulnerability, threat, or impact.