Consider a program that allows a surgeon in one city to assist in an operation on a patient in another city via an Internet connection. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?

What will be an ideal response?

Depending on the patient, a murderer might want to interfere with surgery. Ordinary crackers might want to disrupt communication without regard for its content.

Computer Science & Information Technology

You might also like to view...

The second section of a UML class diagram specifies the:

a. class members b. class name c. class methods d. class modifiers

Computer Science & Information Technology

What is the problem that the C++ namespace facility solves?

What will be an ideal response?

Computer Science & Information Technology