1.11. Exercises
1: | Distinguish among vulnerability, threat, and control. |
2: | Theft usually results in some kind of harm. For example, if someone steals your car, you may suffer financial loss, inconvenience (by losing your mode of transportation), and emotional upset (because of invasion of your personal property and space). List three kinds of harm a company might experience from theft of computer equipment. |
3: | List at least three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential company materials. |
4: | List at least three kinds of damage a company could suffer when the integrity of a program or company data is compromised. |
5: | Describe two examples of vulnerabilities in automobiles for which auto ... |
Get Security in Computing, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.