List the types of local resource that are vulnerable to an attack by an untrusted program that is downloaded from a remote site and run in a local computer.

What will be an ideal response?


Objects in the file system e.g. files, directories can be read/written/created/deleted using the rights of the local user who runs the program.

Network communication - the program might attempt to create sockets, connect to them, send messages etc. Access to printers.
It may also impersonate the user in various ways, for example, sending/receiving email

Computer Science & Information Technology

You might also like to view...

The default Windows 8.1 libraries are __________

a. Desktop, Documents, Downloads, Pictures, Music, and Videos b. Computer, Documents, Downloads, Pictures, Music, and Videos c. Desktop, Documents, Media, Virtual Drives d. Documents, Pictures, Music, Videos, and Virtual Drives

Computer Science & Information Technology

A(n) ____ statement is a statement that returns a value to the statement that called the function.

A. return B. replace C. value D. exit

Computer Science & Information Technology

You must create ____ before any of the other database objects.

A. reports B. queries C. data access pages D. tables

Computer Science & Information Technology

In what way is the checkbook you keep at home for your checking account like an asynchronous-update replication system?

What will be an ideal response?

Computer Science & Information Technology