What are the threats include in computer software, Computer Networking

Assignment Help:

What are the threats include in computer software

The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to the following:

  • Deletion of a program, either by accident or by malicious intent.
  • Theft of a program by the user.
  • Corruption of a program, caused either by a hardware failure or by a virus.

Usually, it has been observed that more of the attacks are due to virus attacks that cause terrible destruction in a very small time.

  • Bugs in the software (intentional or unintentional).
  • Virus attack.

 

 


Related Discussions:- What are the threats include in computer software

What are called transactions, The grouped SQL statements are known as Trans...

The grouped SQL statements are known as Transactions (or) A transaction is a collection of actions embused with ACID properties.

Show the security policy as well integrated security, Q. Show the Security ...

Q. Show the Security Policy as well Integrated Security ? Security policy is on paper statement describing what assets are to be protected and why who is responsible and which

Critical path method, You are the Senior Project Manager in a software comp...

You are the Senior Project Manager in a software company and have, as part of your team, a student on a three month internship. The student has proudly told you that they have stu

What is sliding window, What is Sliding Window? The sliding window is a...

What is Sliding Window? The sliding window is an abstract method that explains the range of sequence numbers that is the concern of the sender and receiver. In other words, he

What is an interrupt request, Question: a) Briefly describe the purpos...

Question: a) Briefly describe the purpose of Windows Powershell? b) Name three ways software can be installed on Linux? c) What is an interrupt request? d) As the

What is subnetting, Q. What is Subnetting ? Subnetting IP add...

Q. What is Subnetting ? Subnetting IP addressing is hierarchical First reach a device through its network id (netid) Then reach the host itself using the se

Explain the hubs and repeaters, Hubs/Repeaters Hubs/Repeaters are used ...

Hubs/Repeaters Hubs/Repeaters are used to connect together two or more network segments of any media type. In larger design, signal quality starts to deteriorate as segment exc

Describe in brief about tree topology, Tree topology Comments 1 -...

Tree topology Comments 1 - This features star nodes on a bus network 2 - All the disadvantages and advantages of both types of networks described above apply to this s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd