Information Security Vulnerabilities

Please answer the following questions in regards to computer security and cite all scholarly references used:

1.    Consider a program to display on a local retail stores website the citys current time and temperature. Who might want to attack the program? What types of harm might they want to cause? What kind of vulnerabilities might they exploit to cause harm?

Textbook:
Pfleeger, Charles P. / Pfleeger, Shari Lawrence, and Marguiles, Jonathan, (2015).  Security in Computing, Fifth, Prentice Hall. ISBN 978-0-13-408504-3

**Textbook not available for download**
Please see attached reference for more information.

You can leave a response, or trackback from your own site.