List at least three kinds of damage a company could suffer when the integrity of a program or company data is compromised

What will be an ideal response?


Possible
answers
include
inability
to
perform
necessary
business
functions
(because
of
software
modification),
public
embarrassment
(e.g.,
if
website
is
defaced),
loss
of
employees'
time
(to
find
and
correct
modifications),
possible
loss
of
life
or
serious
harm
(if
safety-­?critical
software
is
modified).

Computer Science & Information Technology

You might also like to view...

Multiple-choice: Choose the correct HTML tag to make a text italic

a. b. c. d.

  • Computer Science & Information Technology

    What is the purpose of Unified Threat Management (UTM)?

    What will be an ideal response?

    Computer Science & Information Technology

    Mobile device management software secures and manages the mobile devices used in an organization. _________________________

    Answer the following statement true (T) or false (F)

    Computer Science & Information Technology

    Draw an ERD that shows cardinality relationships among the entities. Send the diagram to Jesse.

    What will be an ideal response?

    Computer Science & Information Technology