What are the threats include in computer software, Computer Networking

Assignment Help:

What are the threats include in computer software

The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to the following:

  • Deletion of a program, either by accident or by malicious intent.
  • Theft of a program by the user.
  • Corruption of a program, caused either by a hardware failure or by a virus.

Usually, it has been observed that more of the attacks are due to virus attacks that cause terrible destruction in a very small time.

  • Bugs in the software (intentional or unintentional).
  • Virus attack.

 

 


Related Discussions:- What are the threats include in computer software

Show the seven layers of iso''s osi model, Q. Show the seven layers of ISO'...

Q. Show the seven layers of ISO's OSI model? Ans:- The seven layers are given below:   -  Application Layer -  Presentation Layer -  Session Layer -  Transport Laye

Difference between interior and exterior neighbour gateways, What is the di...

What is the difference between interior and exterior neighbor gateways? Interior gateways connect LANs of one organization, while exterior gateways connect the organization to

Power supply system in satellite system, POWER SUPPLY SYSTEM IN  SATELLITE...

POWER SUPPLY SYSTEM IN  SATELLITE SYSTEM Satellite Earth Station relies on the public power supply system. Two generators (1+1) of 250 KVA each in parallel connection having fa

Show scalability and reliability of computer network, How do you account fo...

How do you account for higher scalability and reliability of computer network? Ans: Computer network will have a large number of computers, which can share database, software

Source independence, Next hop to receiver does not relay on source of packe...

Next hop to receiver does not relay on source of packet. This phenomenon is known 'Source Independence'. It has various benefits. It gives efficient and fast routing. Packet switch

Explain mesh interconnection networks, Mesh : This is two dimensional netwo...

Mesh : This is two dimensional networks.  In this all processing elements are organised in a two dimensional grid. The processor in the row i and column j are indicated by PE i .

Command that shows traffic statistics on serial 0/1, Recognize the command ...

Recognize the command that shows traffic statistics on serial0/1? Ans) show interface serial 0/1

Show the rs232 logic waveform, Q. Show the RS232 Logic Waveform ? RS-2...

Q. Show the RS232 Logic Waveform ? RS-232 Interface Three most important wires for the Serial interface Transmit - Pin 2 Receive - Pin 3 Ground - Pin

Circuit switched and packet-switched mode for sending a file, Two hosts are...

Two hosts are connected by a path made of four links as shown in the figure below. The links are of data rate R = 2 Mbps each. Host A has a file of size F = 1,000,000 bytes to tran

Butterfly permutation, Butterfly permutation This permutation is gettin...

Butterfly permutation This permutation is getting by interchanging the important significant bit in address with smallest significant bit.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd