Consider a program to display on your website your city’s current time and temperature. Who might want to attack your program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?
What will be an ideal response?
In the list of “who,” the student should also consider the random attack against the website just because of, for example, a sequential scan of a range of addresses.
You might also like to view...
Which of the following statements is false?
a. Most operating systems support timeslicing, which enables threads of equal priority to share a processor. b. Without timeslicing, each thread in a set of equal-priority threads runs to completion before other threads of equal priority get a chance to execute. c. With timeslicing, even if a thread has not finished executing when its quantum expires, the processor is taken away from the thread and given to the next thread of equal priority, if one is available. d. An operating system’s thread scheduler determines which thread runs next.
The ________ Wizard assists you with steps to import a text file into Excel
Fill in the blank(s) with correct word
A single USB port can be used to connect up to ____ peripheral devices.
A. 27 B. 127 C. 128 D. 272
A recent virus outbreak has finally been contained and now several users are reporting latency issues. A vulnerability scan was performed and no backdoors were found. Upon further investigation, Matt, the security administrator, notices that websites are being redirected to unauthorized sites. This is an example of which of the following?
A. Botnet B. Rootkits C. Trojan D. Spyware