Discuss an example of threats in computer software, Computer Networking

Assignment Help:

Discuss an example of threats in computer software

Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can detect and clean as many as 50000 viruses, it becomes extremely difficult to detect a new virus numbered 50001. The recent happenings of I Love You, Love Bug, Dinner Party with CEO, etc., viruses have virtually spread all over the world not leaving any type of system.  As reported at many places, the casualty figure has been extremely high and the organisations could not come to a stable state till date. It would be notable that even for developing an antidote it would take many man-hours of research and testing before the things are set right, and in the meanwhile the virus would have done all the damage it can.

Numerous corporate offices do their day-to-day work on-line. A simple task like sending messages, circulars, interview, meeting, promotions, etc., all are dealt with on the corporate Intranet. Assume that a new virus enters the network passing through the stringent anti-viral tests successfully (and of course, undetected). The story starts then and ends in few more moments.

 


Related Discussions:- Discuss an example of threats in computer software

Host system in tcp-ip model, Q. Host System in TCP-IP model? - Standard...

Q. Host System in TCP-IP model? - Standards adopted because of widespread use like (Internet) - The protocols came first plus the model was really just a description of the

Networking security, difference between spambox and inbox in gmail

difference between spambox and inbox in gmail

Parts count method calculation, M E T HOD OF CALCULATION It involves...

M E T HOD OF CALCULATION It involves counting the number of each part type and multiplying with the generic failure rate of each part. On summing up the product, we obtain t

Building distributed systems, Unfortunately, building real-life distributed...

Unfortunately, building real-life distributed systems is not easy. It is hard, for instance, to implement instructions such as "send this data structure to be processed on that com

Dynamic process groups in parallel virtual machine , Dynamic Process Groups...

Dynamic Process Groups To generate and manage dynamic groups, a separate library libgpvm3.a must be connected with the user programs that make use of any of the set functions.

Configure vtp on the switches - ccna, Configure VTP on the Switches VTP...

Configure VTP on the Switches VTP permits the network administrator to control the instances of VLANs on the network by creating VTP domains. Within each VTP domain, one or mor

Key components of inter-vlan routing , As configuring of VLANs helps in con...

As configuring of VLANs helps in controlling the size of broadcast domains. There are some key components of inter-VLAN routing such as VLAN capable switch Router Ro

What are the security models by giving striking analogies, Security models ...

Security models by giving striking analogies to the real world A classical case study: (With due acknowledgements to the security exponent who proposed this theory.) He has c

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd