Identify the three most probable threats to a computing system in an office with fewer than 10 employees. That is, identify the three vulnerabilities most likely to be exploited. Estimate the number of times each vulnerability is exploited per year. Justify your estimate.
What will be an ideal response?
Human error: nonmalicious lapse due to misunderstanding or carelessness. Frequent; 10 to 100 times per year, although usually with little harm.
Inappropriate disclosure: due to human error or lack of judgment. A few times per year, also usually with little harm.
If connected to the Internet, untargeted vulnerability searches (scanning). Once per hour.
You might also like to view...
Most UNIX system programs are relatively small and designed to do one thing well. List at least three advantages to this approach.
What will be an ideal response?
The vast majority of smartphones use the ________ or ________ operating systems
Fill in the blank(s) with correct word
What is malware? List and describe four things that malware can do to your computer.
What will be an ideal response?
The _____ attribute of the decimal-format element represents text used to represent entries that are not numbers.
A. ?minus-sign B. ?zero-digit C. ?pattern-separator? D. ?NaN