Information Security

Please answer the following questions

1.    Consider a program to display on a local retail stores website the citys current time and temperature. Who might want to attack the program? What types of harm might they want to cause? What kind of vulnerabilities might they exploit to cause harm?

Textbook:
Pfleeger, Charles P. / Pfleeger, Shari Lawrence, and Marguiles, Jonathan, (2015).  Security in Computing, Fifth, Prentice Hall. ISBN 978-0-13-408504-3

Additional information located in attachment.

Leave a Reply

Your email address will not be published. Required fields are marked *