What are the threats include in computer software, Computer Networking

Assignment Help:

What are the threats include in computer software

The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to the following:

  • Deletion of a program, either by accident or by malicious intent.
  • Theft of a program by the user.
  • Corruption of a program, caused either by a hardware failure or by a virus.

Usually, it has been observed that more of the attacks are due to virus attacks that cause terrible destruction in a very small time.

  • Bugs in the software (intentional or unintentional).
  • Virus attack.

 

 


Related Discussions:- What are the threats include in computer software

What is the importance of encryption on a network, What is the importance o...

What is the importance of Encryption on a network? Encryption is the process of translating information into a code that is unreadable by the user. It is then translated back o

Multi tasking environment, Multi Tasking Environment Multi tasking exp...

Multi Tasking Environment Multi tasking exploits parallelism by: 1)  Concurrently using the multiple functional units 2)  Pipelining functional units are pipe line toget

What are the bridges, Bridges - Operate in both physical and data link ...

Bridges - Operate in both physical and data link layers - Utilized to divide a network into smaller segments - May as well relay frames between separate LANs - Keeps t

What is the purpose of configuration files for servers, Question 1: a) ...

Question 1: a) Give three examples of Shells in Linux. b) Differentiate between the Join command and the Paste command in Linux, use an example to support your answer.

Show upper layers of tcp-ip model, Q. Show Upper Layers of tcp-ip model? ...

Q. Show Upper Layers of tcp-ip model? The Session Layer - The Session layer allows two parties to hold ongoing communications called a session across a network. - Not

Programming based on message passing, Programming Based on Message Passing ...

Programming Based on Message Passing As we know, the programming model based on message passing uses high level programming languages like C/C++ along with a number of message

Low-earth-orbiting leo satellites , LOW-Earth Orbiting have more advantageo...

LOW-Earth Orbiting have more advantageous in Mobile based communication devices like PDAs, Cell phones and automobile communications. The LOW-Earth Orbiting is a satellite of orbit

Client server processes - application layer, Client  Server Processes ...

Client  Server Processes A network  application  consist  of pairs  of process that send message to one  another  over a network. For  example  in a web application a client

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd