Consider a program to accept and tabulate votes in an election. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?
What will be an ideal response?
This
question
also
foreshadows
longer
discussions
on
the
topic
of
elections
in
Chapters
9
and
13.
The
instructor
may
want
to
return
to
this
question
after
presenting
that
material.
Computer Science & Information Technology
You might also like to view...
When designing a query, if two criteria are placed in the same row, the Or logical operator applies
Indicate whether the statement is true or false
Computer Science & Information Technology
What is the fastest growing sector of the Internet?
(a) E-commerce. (b) Instant messaging. (c) Open source programming. (d) Browsers.
Computer Science & Information Technology