List at least three kinds of damage a company could suffer when the integrity of a program or company data is compromised

What will be an ideal response?

Possible
answers
include
inability
to
perform
necessary
business
functions
(because
of
software
modification),
public
embarrassment
(e.g.,
if
website
is
defaced),
loss
of
employees'
time
(to
find
and
correct
modifications),
possible
loss
of
life
or
serious
harm
(if
safety-­?critical
software
is
modified).

Computer Science & Information Technology

You might also like to view...

When moving from one slide to another, the sound playing on the first slide will always stop

Indicate whether the statement is true or false

Computer Science & Information Technology

A ________ IDS monitors traffic at selected points on a network or interconnected set of networks.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology