What are the threats include in computer software, Computer Networking

Assignment Help:

What are the threats include in computer software

The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to the following:

  • Deletion of a program, either by accident or by malicious intent.
  • Theft of a program by the user.
  • Corruption of a program, caused either by a hardware failure or by a virus.

Usually, it has been observed that more of the attacks are due to virus attacks that cause terrible destruction in a very small time.

  • Bugs in the software (intentional or unintentional).
  • Virus attack.

 

 


Related Discussions:- What are the threats include in computer software

Document the switch configuration- ccna, Document the Switch Configuration ...

Document the Switch Configuration When you have done your troubleshooting, capture the output of the show run command and save it to a text document for each switch.

Cisco express forwarding and interface controllers , Cisco Express Forwardi...

Cisco Express Forwarding CEF is a new method of switching that available in IOS, its overcome the drawbacks of fast switching method In IOS packet switching, There are thre

The transport layer - fundamentals of networks, The transport Layer Co...

The transport Layer Communication  between  computers is handled by the transport layer which  is comprised of transmission control  protocol (TCP) and the users  datagram pro

Explain persistence timer, Explain Persistence timer? To deal with ...

Explain Persistence timer? To deal with the zero-size windows What if a receiver advertises that the window size is 0 (by sending ACK) and this ACK is lost? - A

Routing algorithms, compare routing algorithms with non adaptive algorithms...

compare routing algorithms with non adaptive algorithms

Explain priority and reservation of token passing, Priority and Reservation...

Priority and Reservation Higher priority stations may possibly access the token sooner Each station has a priority code Since token passes by station waiting to t

Source independence, Next hop to receiver does not relay on source of packe...

Next hop to receiver does not relay on source of packet. This phenomenon is known 'Source Independence'. It has various benefits. It gives efficient and fast routing. Packet switch

What does the user datagram protocol (udp) , UDP is connectionless, and doe...

UDP is connectionless, and does not give error checking. But remember, error checking can happen at other layers too.

Different kinds of firewall architectures, What are the different kinds of ...

What are the different kinds of firewall architectures?

Multiple activity charts, A multiple activity chart records the related ...

A multiple activity chart records the related sequence of activities of more than one subject, men and / or machine on a common time scale showing the relationship between

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd