Information Security

Please answer the following questions

1.    Consider a program to display on a local retail stores website the citys current time and temperature. Who might want to attack the program? What types of harm might they want to cause? What kind of vulnerabilities might they exploit to cause harm?

Textbook:
Pfleeger, Charles P. / Pfleeger, Shari Lawrence, and Marguiles, Jonathan, (2015).  Security in Computing, Fifth, Prentice Hall. ISBN 978-0-13-408504-3

Additional information located in attachment.

You can leave a response, or trackback from your own site.