A threat is a potential violation of security. Common threats to computer security include snooping, modification (or alteration), masquerading (or spoofing), repudiation of origin, denial of receipt, and denial of service (DoS). Provide a definition and a for each threat. In addition, explain how each threat/attack can be prevented or defended.

A threat is a potential violation of security. Common threats to computer security include snooping, modification (or alteration), masquerading (or spoofing), repudiation of origin, denial of receipt, and denial of service (DoS). Provide a definition and a  for each threat. In addition, explain how each threat/attack can be prevented or defended. A sample answer is provided below for  (you may omit  from this activity, as the answer is given here):The store owner can defend against this kind of attack only by proving that Kevin received the item despite his denial. The store owner should choose a \”signature required\” delivery option, which requires the recipient\’s signature or another electronic acknowledgement of receipt from the recipient. One pager with references