Consider a program that allows consumers to order products from the web. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?

What will be an ideal response?


Cause denial of service (disgruntled consumers, ordinary crackers), acquire products at reduced prices (consumers), find pricing strategy (competition).

Computer Science & Information Technology

You might also like to view...

A ________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.

A) atomic operation B) race condition C) livelock D) deadlock

Computer Science & Information Technology

Use the ________ element to associate JavaScript with a web page.

a. object b. script c. embed d. canvas

Computer Science & Information Technology

Which of the followings is the correct CSS property for an element's background color?

A. background color B. background-color C. bgcolor D. color

Computer Science & Information Technology

IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology