Identify the three most probable threats to a computing system in an office with fewer than 10 employees. That is, identify the three vulnerabilities most likely to be exploited. Estimate the number of times each vulnerability is exploited per year. Justify your estimate

What will be an ideal response?


(Following
answers
are
subject
to
debate.)
Human
error:
nonmalicious
lapse
due
to
misunderstanding
or
carelessness.
Frequent;
10
to
100
times
per
year,
although
usually
with
little
harm.
Inappropriate
disclosure:
due
to
human
error
or
lack
of
judgment.
A
few
times
per
year,
also
usually
with
little
harm.
If
connected
to
the
Internet,
untargeted
vulnerability
searches
(scanning).
Once
per
hour.

Computer Science & Information Technology

You might also like to view...

Block ciphers operate on blocks of data.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To enhance pictures, you can format the images by re-coloring, changing the color saturation and tone, adding artistic effects, and altering the picture style.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which individual will examine an infrastructure to find existing vulnerabilities and, instead of hurting the infrastructure, report findings so that an administrator can further harden the network?

A. Forensic analyst B. Black hat hacker C. White hat hacker D. First responder  

Computer Science & Information Technology

____________________ is the order of CSS rules dictating that child elements receive properties from parent elements.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology