Identify the three most probable threats to a computing system in an office with fewer than 10 employees. That is, identify the three vulnerabilities most likely to be exploited. Estimate the number of times each vulnerability is exploited per year. Justify your estimate

What will be an ideal response?

(Following
answers
are
subject
to
debate.)
Human
error:
nonmalicious
lapse
due
to
misunderstanding
or
carelessness.
Frequent;
10
to
100
times
per
year,
although
usually
with
little
harm.
Inappropriate
disclosure:
due
to
human
error
or
lack
of
judgment.
A
few
times
per
year,
also
usually
with
little
harm.
If
connected
to
the
Internet,
untargeted
vulnerability
searches
(scanning).
Once
per
hour.

Computer Science & Information Technology

You might also like to view...

If software is installed when an associated document is selected, or when selected from the Programs and Features applet, the deployment method is _____________________

a. Publishing software to computers b. Publishing software to users c. Assigning software to computers d. Assigning software to users

Computer Science & Information Technology

A master page is basically defined as a nondisplaying page.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology