Consider a program that allows a surgeon in one city to assist in an operation on a patient in another city via an Internet connection. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?
What will be an ideal response?
Depending
on
the
patient,
a
murderer
might
want
to
interfere
with
surgery.
Ordinary
crackers
might
want
to
disrupt
communication
without
regard
for
its
content.
Computer Science & Information Technology
You might also like to view...
The PNG format supports variable transparency.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
As part of the risk identification process, listing the assets in order of importance can be achieved by using a weighted __________ worksheet.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology