What are the three main targets in information technology? Provide some examples of the vulnerabilities that each of the targets face. What countermeasures are in place to prevent attacks?
What will be an ideal response?
A strong answer will include the following targets, in addition to vulnerabilities and countermeasures that they place.
a. Software
b. Hardware
c. Network
You might also like to view...
Homophobes often hold gays responsible for threats to the safety of the American public. Which of the following is not one of these "threats"?
a. AIDS b. religious abomination c. pedophilia d. Domestic violence
Which of the following is described as the workhorse of the federal judiciary?
A. courts of limited jurisdiction B. courts of general jurisdiction C. U.S. district courts D. state supreme court
_______ a legally lesser category than murder, includes homicides that occur in a moment of extreme anger or recklessness without previous ill intent.
a. manslaughter b. felony murder c. aggravated battery d. mayhem
Criminal possession of contraband may take either of two forms, actual possession or ________ possession
Fill in the blank(s) with correct word