What are the threats include in computer software, Computer Networking

Assignment Help:

What are the threats include in computer software

The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to the following:

  • Deletion of a program, either by accident or by malicious intent.
  • Theft of a program by the user.
  • Corruption of a program, caused either by a hardware failure or by a virus.

Usually, it has been observed that more of the attacks are due to virus attacks that cause terrible destruction in a very small time.

  • Bugs in the software (intentional or unintentional).
  • Virus attack.

 

 


Related Discussions:- What are the threats include in computer software

Nak free reliable data transfer protocol, Normal 0 false fal...

Normal 0 false false false EN-IN X-NONE X-NONE

Simple Pendulum, Give me a wide idea about simple pendulum and its types wi...

Give me a wide idea about simple pendulum and its types with equation and tables as usual assignment?

What command do we use to disable domain lookup, no ip domain-lookupcommand...

no ip domain-lookupcommand is use to disable domain lookup

Determine the concept of placing antenna on hieght, Determine the concept o...

Determine the concept of placing antenna on hieght First, starting deployment simply placed cells in regions where there was high density of vehicle or human population. Once t

Show the need for network layer, Q. Show the Need for Network Layer? N...

Q. Show the Need for Network Layer? Need for Network Layer - To solve the problem of delivery of data through several links. - Accountable for Host to Host delivery

Classes and dotted decimal notation, The relationship between dotted decima...

The relationship between dotted decimal notation and classes is shown as follows. In class A the three octets managed to a host suffix. In class B the last most two octets ar

Encoding process, Encoding Process c= uG u: binary da...

Encoding Process c= uG u: binary data sequence of length 4( input) G: Generator matrix which is 7*4 c: Codeword     D

Explain the term - global corporate-wide network, Explain the term - global...

Explain the term - global corporate-wide network It would be highly interesting to note that more than 70 per cent of all security related problems start from within the organi

Cpm-pert network analysis problem, Solve the following CPM/PERT Network Ana...

Solve the following CPM/PERT Network Analysis problem: Given the following network and activity time estimates, determine earliest and latest activity times, slack, the expecte

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd