What are the threats include in computer software, Computer Networking

Assignment Help:

What are the threats include in computer software

The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to the following:

  • Deletion of a program, either by accident or by malicious intent.
  • Theft of a program by the user.
  • Corruption of a program, caused either by a hardware failure or by a virus.

Usually, it has been observed that more of the attacks are due to virus attacks that cause terrible destruction in a very small time.

  • Bugs in the software (intentional or unintentional).
  • Virus attack.

 

 


Related Discussions:- What are the threats include in computer software

Explain about switching networks, Question 1: a. Differentiate between ...

Question 1: a. Differentiate between the several types of switching networks together with illustration. b. With the help of a diagram explain the two modes of operation un

What is internet, I have a project on Information Communication Technology(...

I have a project on Information Communication Technology(I.C.T). So sir I want to know that what is internet? and how it works?

Categories of networks, Distance covered, Based on size, ownership and phys...

Distance covered, Based on size, ownership and physical architecture - LAN (Local Area Network) - Suitable for smaller geographical area - MAN (Metropolitan Area Network) - S

Explain persistence timer, Explain Persistence timer? To deal with ...

Explain Persistence timer? To deal with the zero-size windows What if a receiver advertises that the window size is 0 (by sending ACK) and this ACK is lost? - A

Two items that tcp and udp share in common, Recognize the two items that TC...

Recognize the two items that TCP and UDP share in common? Ans) TCP and UPD are both layer 4 Transport protocols and both use port number to recognize upper level applications.

Internet address, Addresses are necessary for virtually everything we do on...

Addresses are necessary for virtually everything we do on the Internet. In TCP/IP the IP is a mechanism for providing addresses for computers on the Internet. Internet addresses ha

Show the data encryption standard, Q. Show the Data Encryption Standard? ...

Q. Show the Data Encryption Standard? Data Encryption Standard - Bit-level encryption method designed by IBM - Adopted as standard for nonmilitary and nonclassified us

command saves the configuration stored in ram to nvram, Which command save...

Which command saves the configuration stored in RAM to NVRAM Ans) copy running-config startup-config is the command which saves the configuration stored in RAM to NVRAM

Show data link and physical vs subnet, Q. Show Data link and Physical vs Su...

Q. Show Data link and Physical vs Subnet? - Data link layer The function of the Data Link Layer is -offers for the control of the physical layer and detects and possib

Objective of parallel algorithms, After studying this part the students wil...

After studying this part the students will be able to understand about the following: Analysis of Parallel Algorithms; Different Models of Computation; o   Interco

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd