Ask Question
7 July, 05:24

Consider a program to accept and tabulate votes in an election. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?

+4
Answers (1)
  1. 7 July, 06:09
    0
    Who might want to attack the program to accept and tabulate votes in an election?

    The political opponents.

    What types of harm might they want to cause?

    A silent interception; an interruption a modification and a fabrication

    What kinds of vulnerabilities might they exploit to cause harm?

    The assets vulnerablities.

    Explanation:

    Political opponents might want to attack the program to accept and tabulate votes in an election to modify factual results to show them as the winners.

    The harm they might want to cause is cheating the elections by copying the program, data files or wiretapping; to get the system lost, or get it unavailable or unusable with the factual data in the large dams and disable the power grids and modify the values accordingly adding the forged results.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question ✅ “Consider a program to accept and tabulate votes in an election. Who might want to attack the program? What types of harm might they want to ...” in 📘 Computers and Technology if you're in doubt about the correctness of the answers or there's no answer, then try to use the smart search and find answers to the similar questions.
Search for Other Answers