Discuss three sources of exposure (threats) to the operating system


1 . Privileged personnel who abuse their authority. Systems administrators and systems programmers require unlimited access to the operating system to perform maintenance and to recover from system failures. Such individuals may use this authority to access users' programs and data files.
2 . Individuals both internal and external to the organization who browse the operating system to identify and exploit security flaws.
3 . Individuals who intentionally (or accidentally) insert computer viruses or other forms of destructive programs into the operating system.

Business

You might also like to view...

The amount of nonborrowed reserves equals

A. the monetary base plus the amount of discount loans. B. the amount of reserves plus the amount of discount loans. C. the amount of reserves minus the sum of the amount of discount loans and currency. D. the monetary base minus the sum of the amount of discount loans and currency.

Business

Media coordination can occur across and within media types, but marketers should combine personal and nonpersonal communications channels through multiple-vehicle, multiple-stage campaigns to achieve maximum impact and increase message reach and

impact. Indicate whether the statement is true or false

Business

The hub of retailing in a city is considered to be the _____

a. central business district b. neighborhood business district c. secondary business district d. string

Business

When converting from an old to a new system, what is a direct change over? A modular conversion? A Distributed conversion?

What will be an ideal response?

Business