Discuss an example of threats in computer software, Computer Networking

Assignment Help:

Discuss an example of threats in computer software

Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can detect and clean as many as 50000 viruses, it becomes extremely difficult to detect a new virus numbered 50001. The recent happenings of I Love You, Love Bug, Dinner Party with CEO, etc., viruses have virtually spread all over the world not leaving any type of system.  As reported at many places, the casualty figure has been extremely high and the organisations could not come to a stable state till date. It would be notable that even for developing an antidote it would take many man-hours of research and testing before the things are set right, and in the meanwhile the virus would have done all the damage it can.

Numerous corporate offices do their day-to-day work on-line. A simple task like sending messages, circulars, interview, meeting, promotions, etc., all are dealt with on the corporate Intranet. Assume that a new virus enters the network passing through the stringent anti-viral tests successfully (and of course, undetected). The story starts then and ends in few more moments.

 


Related Discussions:- Discuss an example of threats in computer software

Networking assignment, Suppose a small company wants to develop a computer ...

Suppose a small company wants to develop a computer network of 18 computers in its main office. Due to limited resources the company wants a network architecture where a single com

Distance vector and link-state protocol, What's the difference among distan...

What's the difference among distance vector and link-state protocol?

Explain semantic web , What the Semantic Web is? Ans) The Semantic Web ...

What the Semantic Web is? Ans) The Semantic Web is a vision, that thinks to join together dispersed bits of data on the internet, very much like web pages are presently joined

Stop service advertisements from flooding a network, To stop Service Adver...

To stop Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks? Ans) Every router builds its own

Command structure in distributed enrollment protocol , Command Structure: ...

Command Structure: Commands are all-upper-case strings, either 4 or 6 characters in length. Table 1 shows the commands, and (for method commands) the parameters, return values, ex

Merge sort circuit, First, split the given series of n numbers into two par...

First, split the given series of n numbers into two parts, each consisting of n/2 numbers. After that, recursively split the series into two parts until each number acts as an inde

Uses of fragmentation and reassembly, Uses of fragmentation and reassembly ...

Uses of fragmentation and reassembly The More bit is used for fragmentation and reassembly. If this bit is 0, then either there has been no fragmentation of this packet or this

How is computer networks used in teleconferencing, Q. How is computer netwo...

Q. How is computer networks used in teleconferencing? Teleconferencing: Teleconferencing allows conference to happen without the participants being in the same place. Applica

Barters, What is a OSI layer 2 device called a "barter"?

What is a OSI layer 2 device called a "barter"?

Summary of special ip addresses, The table below gives a summary of special...

The table below gives a summary of special IP addresses.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd