Consider a program that allows consumers to order products from the web. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?

What will be an ideal response?

Cause
denial
of
service
(disgruntled
consumers,
ordinary
crackers),
acquire
products
at
reduced
prices
(consumers),
find
pricing
strategy
(competition).

Computer Science & Information Technology

You might also like to view...

Which of the following commands is used for a DHCP server to list the configured range of IP addresses and statistics for the number of leased addresses?

A) show ip dhcp binding B) show ip dhcp pool C) show ip dhcp network D) show ip dhcp range

Computer Science & Information Technology

A good application for the case structure is

a. Medical deductions b. Payroll calculations c. Changing a specific character to a specific numeric value d. All of the above

Computer Science & Information Technology