Discuss an example of threats in computer software, Computer Networking

Assignment Help:

Discuss an example of threats in computer software

Assume only one attack out of the above list i.e., the virus attack. Though the present anti-virus software solutions can detect and clean as many as 50000 viruses, it becomes extremely difficult to detect a new virus numbered 50001. The recent happenings of I Love You, Love Bug, Dinner Party with CEO, etc., viruses have virtually spread all over the world not leaving any type of system.  As reported at many places, the casualty figure has been extremely high and the organisations could not come to a stable state till date. It would be notable that even for developing an antidote it would take many man-hours of research and testing before the things are set right, and in the meanwhile the virus would have done all the damage it can.

Numerous corporate offices do their day-to-day work on-line. A simple task like sending messages, circulars, interview, meeting, promotions, etc., all are dealt with on the corporate Intranet. Assume that a new virus enters the network passing through the stringent anti-viral tests successfully (and of course, undetected). The story starts then and ends in few more moments.

 


Related Discussions:- Discuss an example of threats in computer software

Define the network security, Q. Define the Network Security? The Intern...

Q. Define the Network Security? The Internet and Web technology presents enormous promise for e-commerce. Web now is used to handle important business assets that became the

#title.assignment., hii i want to make a assignment from you. please help m...

hii i want to make a assignment from you. please help me.

Which protocol is used for booting diskless workstations, Reverse Address R...

Reverse Address Resolution Protocol - RARP is ARP's counterpart, but it resolves IP addresses to MAC addresses typically on diskless workstations.

Discuss about the software in detail, Discuss about the Software in detail ...

Discuss about the Software in detail Software contain a number of components such as SQL Server for database connectivity, Systems Management Server for easy Web management,

Control flow in distributed enrollment protocol , Control Flow: Once the c...

Control Flow: Once the client has established a network connection with a server, the server must instantiate a new, empty, BasicEnrollmentManager implementation for this client,

What is the network time protocol, What is the Network Time Protocol? ...

What is the Network Time Protocol? A protocol that makes sures accurate local timekeeping with reference to radio and atomic clocks located on the Internet. This protocol is c

Enumerate about the star topology, Enumerate about the Star networks C...

Enumerate about the Star networks Comments: 1 - If one connection/station fails the other devices aren't affected 2 - If central hub breaks down, the whole network fail

database server in client server environment, Normal 0 false ...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd