What are the threats include in computer software, Computer Networking

Assignment Help:

What are the threats include in computer software

The second component vulnerable to threats to the system is software. Threats to software may include, but are not limited to the following:

  • Deletion of a program, either by accident or by malicious intent.
  • Theft of a program by the user.
  • Corruption of a program, caused either by a hardware failure or by a virus.

Usually, it has been observed that more of the attacks are due to virus attacks that cause terrible destruction in a very small time.

  • Bugs in the software (intentional or unintentional).
  • Virus attack.

 

 


Related Discussions:- What are the threats include in computer software

Explain physical layer of osi reference model, Q. Explain physical layer of...

Q. Explain physical layer of Osi reference model? - The physical layer deals among the physical characteristics of the transmission medium. - It defines the mechanical, elec

Client server architecture - application layer, Client  Server Architectur...

Client  Server Architecture There is an  always  on host  called  server  which  provides  service requests to many other hosts  called  clients. In other words  client progra

Ieee specification for spanning tree protocol, What is the IEEE specificati...

What is the IEEE specification for Spanning Tree Protocol Ans) IEEE 8021.d Spanning Tree Protocol (STP) was developed to stop routing loops in a network. If a router, switch, or

Describe about the term- network, Describe about the term- network If n...

Describe about the term- network If network tends to lose the packets, it is better to acknowledge each one of them separately, so the lost packets could be retransmitted. On t

What does ''p'' mean when running a trace, When a P is returned when a Trac...

When a P is returned when a Trace is run, it means the Protocol is unreachable.

Show nonreturn to zero encoding, Q. Show Nonreturn to Zero encoding? - ...

Q. Show Nonreturn to Zero encoding? - Value of signal is for all time positive or negative - NRZ-L Signal level depends on bit represented; positive typically means 0

Advantage and disadvantage of wiring schemes, ADVANTAGE AND DISADVANTAGE OF...

ADVANTAGE AND DISADVANTAGE OF WIRING SCHEMES:  Each of three wiring procedure has disadvantages and advantages, which are illustrate as follows: RELIABILITY ISSUES:  W

Compute shortest path, Compute the shortest path from t to all network node...

Compute the shortest path from t to all network nodes.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd