List at least three kinds of damage a company could suffer when the integrity of a program or company data is compromised.
What will be an ideal response?
Possible answers include inability to perform necessary business functions (because of software modification), public embarrassment (e.g., if website is defaced), loss of employees’ time (to find and correct modifications), possible loss of life or serious harm (if safety-critical software is modified).
Computer Science & Information Technology
You might also like to view...
Unethical behavior
a. is the same as illegal behavior. b. is based on civil disobedience. c. is different from illegal behavior. d. is governed by specific laws passed by legislative bodies.
Computer Science & Information Technology
Which type of controls are software or hardware components used to restrict access?
A. logical controls B. physical controls C. preventive controls D. administrative controls
Computer Science & Information Technology