List at least three kinds of damage a company could suffer when the integrity of a program or company data is compromised.
What will be an ideal response?
Possible answers include inability to perform necessary business functions (because of software modification), public embarrassment (e.g., if websiteis defaced), loss of employees’ time (to find and correct modifications), possible loss of life or serious harm (if safety-�critical software is modified).
Computer Science & Information Technology
You might also like to view...
In Visual Basic, a(n) ________, such as labels, text boxes, and buttons, adds specific functionality to a form
Fill in the blank(s) with correct word
Computer Science & Information Technology
A program that looks benign but actually has a malicious purpose is a _______
a. Trojan horse b. Virus c. Worm d. Cookie
Computer Science & Information Technology