Identify the three most probable threats to a computing system in an office with fewer than 10 employees. That is, identify the three vulnerabilities most likely to be exploited. Estimate the number of times each vulnerability is exploited per year. Justify your estimate.
What will be an ideal response?
Human error: nonmalicious lapse due to misunderstanding or carelessness. Frequent; 10 to 100 times per year, although usually with little harm.
Inappropriate disclosure: due to human error or lack of judgment. A few times per year, also usually with little harm.
If connected to the Internet, untargeted vulnerability searches (scanning). Once per hour.
Computer Science & Information Technology
You might also like to view...
A(n) ________ key is created from naturally occurring data outside of the database, such as a driver's license number
A) natural B) artificial C) alternate D) composite
Computer Science & Information Technology
What is the name of the standard output stream?
What will be an ideal response?
Computer Science & Information Technology