Consider a program that allows consumers to order products from the web. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?
What will be an ideal response?
Cause denial of service (disgruntled consumers, ordinary crackers), acquire products at reduced prices (consumers), find pricing strategy (competition).
You might also like to view...
A ________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.
A) atomic operation B) race condition C) livelock D) deadlock
Use the ________ element to associate JavaScript with a web page.
a. object b. script c. embed d. canvas
Which of the followings is the correct CSS property for an element's background color?
A. background color B. background-color C. bgcolor D. color
IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network.
Answer the following statement true (T) or false (F)