List the types of local resource that are vulnerable to an attack by an untrusted program that is downloaded from a remote site and run in a local computer.

What will be an ideal response?

Objects in the file system e.g. files, directories can be read/written/created/deleted using the rights of the local user who runs the program.

Network communication - the program might attempt to create sockets, connect to them, send messages etc. Access to printers.
It may also impersonate the user in various ways, for example, sending/receiving email

Computer Science & Information Technology

You might also like to view...

The organization of the file system on a server has no impact on network performance or security.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ____ button is seen in the accompanying figure.

A. image submit B. push C. submit D. reset

Computer Science & Information Technology