What are the threats include in computer software, Computer Networking

Assignment Help:

What are the threats include in computer software

The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to the following:

  • Deletion of a program, either by accident or by malicious intent.
  • Theft of a program by the user.
  • Corruption of a program, caused either by a hardware failure or by a virus.

Usually, it has been observed that more of the attacks are due to virus attacks that cause terrible destruction in a very small time.

  • Bugs in the software (intentional or unintentional).
  • Virus attack.

 

 


Related Discussions:- What are the threats include in computer software

Dns working - domain name server, DNS Working While discussing about t...

DNS Working While discussing about the working of the DNS, there are many things which need to consider and play Avery significant role. This can the type of communication bet

Explain inference, What is inference? Ans) The principle of "inference"...

What is inference? Ans) The principle of "inference" is fairly a simple one: being capable to derive new data from data that you already know. In a mathematical sense, querying

The functions of the typical server program, What are the functions of the ...

What are the functions of the typical server program? Ans) It waits for client-initiated requests. Implements many requests at the similar time. Takes care of VIP clients first.

Explain communications channels, A communications channel is pathways over ...

A communications channel is pathways over which information can be communicate. It may be described by a physical wire that connects communicating devices, or by a radio, laser, or

Hybrid of client server and p2p architecture, Hybrid  of Client Server and...

Hybrid  of Client Server and P2P Architecture Both of  the architecture  are  commonly used  architecture. However  many  applications  are organized as by brides of the  clie

What is bridged ethernet, Bridged Ethernet Raises bandwidth by divi...

Bridged Ethernet Raises bandwidth by dividing the network into smaller networks allowing concurrent communications Separates collision domains because traffic is lower

What is cryptography, The science and art of manipulating messages in order...

The science and art of manipulating messages in order to create them secure is known as cryptography..... Two types are:- Symmetric key cryptography and Asymmetric key crypto

Netware ipx addressing uses a network number, NetWare IPX addressing uses a...

NetWare IPX addressing uses a network number and a node number. Which  statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digi

Configure the management interface- spanning tree protocol, Configure the m...

Configure the management interface address on all three switches.  S1(config)#interface vlan1 S1(config-if)#ip address 172.17.10.1 255.255.255.0 S1(config-if)#no shutdown

Reliable data transfer over a perfectly reliable channel r, Reliable  dat...

Reliable  data transfer  over a perfectly reliable channel rdt 1.0 First  all consider  the simplest  care in  which  the underlying  channel  perfectly reliable.  The protoco

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd