Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure malicious or not? Did the attack target you specifically, or was it general and you were the unfortunate victim?

What will be an ideal response?


Possible answers include any situation in which the student was harmed by a breach of confidentiality, integrity, or availability in an information system. Students must demonstrate an understanding of the difference between malicious attacks and nonmalicious failures, as well as the difference between targeted attacks and incidents that affect a more general population.

Computer Science & Information Technology

You might also like to view...

The purpose of the ________ element is to contain information that would typically be some type of fine print or a disclaimer of some kind.

a. dd b. small c. legal d. em

Computer Science & Information Technology

Which protocol is used when sending files as attachments by e-mail?

A) Simple Mail Transfer Protocol (SMTP) B) Post Office Protocol (POP) C) Multipurpose Internet Mail Extensions (MIME) D) User Datagram Protocol (UDP)

Computer Science & Information Technology

The AutoComplete feature automatically completes an entry based on previous entries in a column. _________________________  

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The AutoSize attribute of the SizeMode property of a PictureBox object may cause distortion of an image. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology