Discuss an example of threats in computer software, Computer Networking

Assignment Help:

Discuss an example of threats in computer software

Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can detect and clean as many as 50000 viruses, it becomes extremely difficult to detect a new virus numbered 50001. The recent happenings of I Love You, Love Bug, Dinner Party with CEO, etc., viruses have virtually spread all over the world not leaving any type of system.  As reported at many places, the casualty figure has been extremely high and the organisations could not come to a stable state till date. It would be notable that even for developing an antidote it would take many man-hours of research and testing before the things are set right, and in the meanwhile the virus would have done all the damage it can.

Numerous corporate offices do their day-to-day work on-line. A simple task like sending messages, circulars, interview, meeting, promotions, etc., all are dealt with on the corporate Intranet. Assume that a new virus enters the network passing through the stringent anti-viral tests successfully (and of course, undetected). The story starts then and ends in few more moments.

 


Related Discussions:- Discuss an example of threats in computer software

Explain twisted pair cable, Explain twisted pair cable. A pair of wires...

Explain twisted pair cable. A pair of wires twisted with each other is CALLED as twisted pair cable.  A set of four pairs of twisted wires are bundled to form cable. These are

Enhance the competition among the internet service providers, 1 Suppose you...

1 Suppose you are the new regulator in charge who has authority over Internet services (although in reality such a position may not exist depending on your country). You aim to enh

Html, Write an HTML program segment that contains hypertext links from one ...

Write an HTML program segment that contains hypertext links from one document to another.

Network access technologies, Question 1 Explain the following with respect...

Question 1 Explain the following with respect to Data Encoding                     Digital Signaling of Digital Data                     Digital Signal Encoding Techniques Questi

State ethernet frame format, Ethernet Frame Format Consists of sev...

Ethernet Frame Format Consists of seven fields There is No mechanism for acknowledging received frames considered an unreliable medium

Explain a transaction server, With a transaction server, the client request...

With a transaction server, the client requests remote procedures that reside on the server with an SQL database engine. These remote processes on the server execute a group of SQL

Define metropolitan area network, Q. Define Metropolitan Area Network? ...

Q. Define Metropolitan Area Network? Metropolitan Area Network (MAN) Cable Network Architecture: Overview Protocols and Standards - Set of regulations that go

Explain fdm and tdm with example, Question 1 Explain FDM and TDM with exam...

Question 1 Explain FDM and TDM with example Question 2 Define B-ISDN and explain its services Question 3 What is symmetric key cryptography? Describe one symmetric

Responses - application layer, Responses Responses  are sent  from the...

Responses Responses  are sent  from the  server to the client. A responses is a three  digit code that  may be followed by additional textual information.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd