Consider a program to accept and tabulate votes in an election. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?

What will be an ideal response?


This
question
also
foreshadows
longer
discussions
on
the
topic
of
elections
in
Chapters
9
and
13.
The
instructor
may
want
to
return
to
this
question
after
presenting
that
material.

Computer Science & Information Technology

You might also like to view...

>> is known as the stream ____________ operator.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The CentOS 7 Automatic Bug Reporting Tool (ABRT) daemon resides in the background and watches for application crashes.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

?Read the following sentence and key the correct terminal punctuation mark in the blank.How does the defibrillator work _____

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In order to enter a corporate office, employees must enter a PIN. Which of the following are common risks when using this type of entry system? (Select TWO)

A. Shoulder surfing B. Key logging C. Tailgating D. Man-in-the-middle attacks E. Dumpster diving

Computer Science & Information Technology